Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! ECSAv10 EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing is now Stable and With Pass Result

ECSAv10 Practice Exam Questions and Answers

EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

Last Update 1 day ago
Total Questions : 201

ECSAv10 is stable now with all latest exam questions are added 1 day ago. Just download our Full package and start your journey with ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing certification. All these ECCouncil ECSAv10 practice exam questions are real and verified by our Experts in the related industry fields.

ECSAv10 PDF

ECSAv10 PDF (Printable)
$48
$119.99

ECSAv10 Testing Engine

ECSAv10 PDF (Printable)
$56
$139.99

ECSAv10 PDF + Testing Engine

ECSAv10 PDF (Printable)
$70.8
$176.99
Question # 1

Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.

Options:

A.  

Unannounced Testing

B.  

Double Blind Testing

C.  

Announced Testing

D.  

Blind Testing

Discussion 0
Question # 2

What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?

Question # 2

Options:

A.  

NIDS are usually a more expensive solution to implement compared to HIDS.

B.  

Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such intrusion events.

C.  

NIDS are standalone hardware appliances that include network intrusion detection capabilities whereas HIDS consist of software agents installed on individual computers within the system.

D.  

HIDS requires less administration and training compared to NIDS.

Discussion 0
Question # 3

Which of the following external pen testing tests reveals information on price, usernames and passwords, sessions, URL characters, special instructors, encryption used, and web page behaviors?

Question # 3

Options:

A.  

Check for Directory Consistency and Page Naming Syntax of the Web Pages

B.  

Examine Server Side Includes (SSI)

C.  

Examine Hidden Fields

D.  

Examine E-commerce and Payment Gateways Handled by the Web Server

Discussion 0
Question # 4

Which of the following will not handle routing protocols properly?

Options:

A.  

“Internet-router-firewall-net architecture”

B.  

“Internet-firewall-router-net architecture”

C.  

“Internet-firewall -net architecture”

D.  

“Internet-firewall/router(edge device)-net architecture”

Discussion 0
Question # 5

Which one of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?

Options:

A.  

Sunbelt Network Security Inspector (SNSI)

B.  

CORE Impact

C.  

Canvas

D.  

Microsoft Baseline Security Analyzer (MBSA)

Discussion 0
Question # 6

Identify the correct formula for Return on Investment (ROI).

Options:

A.  

ROI = ((Expected Returns – Cost of Investment) / Cost of Investment) * 100

B.  

ROI = (Expected Returns + Cost of Investment) / Cost of Investment

C.  

ROI = (Expected Returns Cost of Investment) / Cost of Investment

D.  

ROI = ((Expected Returns + Cost of Investment) / Cost of Investment) * 100

Discussion 0
Question # 7

Windows stores user passwords in the Security Accounts Manager database (SAM), or in the Active Directory database in domains. Passwords are never stored in clear text; passwords are hashed and the results are stored in the SAM.

NTLM and LM authentication protocols are used to securely store a user's password in the SAM database using different hashing methods.

Question # 7

The SAM file in Windows Server 2008 is located in which of the following locations?

Options:

A.  

c:\windows\system32\config\SAM

B.  

c:\windows\system32\drivers\SAM

C.  

c:\windows\system32\Setup\SAM

D.  

c:\windows\system32\Boot\SAM

Discussion 0
Question # 8

Which of the following statement holds true for TCP Operation?

Question # 8

Options:

A.  

Port numbers are used to know which application the receiving host should pass the data to

B.  

Sequence numbers are used to track the number of packets lost in transmission

C.  

Flow control shows the trend of a transmitting host overflowing the buffers in the receiving host

D.  

Data transfer begins even before the connection is established

Discussion 0
Question # 9

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using Idp.exe.

What are you trying to accomplish here?

Options:

A.  

Poison the DNS records with false records

B.  

Enumerate MX and A records from DNS

C.  

Establish a remote connection to the Domain Controller

D.  

Enumerate domain user accounts and built-in groups

Discussion 0
Question # 10

ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead.

ARP spoofing attack is used as an opening for other attacks.

Question # 10

What type of attack would you launch after successfully deploying ARP spoofing?

Options:

A.  

Parameter Filtering

B.  

Social Engineering

C.  

Input Validation

D.  

Session Hijacking

Discussion 0
Question # 11

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.

link:www.ghttech.net

What will this search produce?

Options:

A.  

All sites that link to ghttech.net

B.  

Sites that contain the code: link:www.ghttech.net

C.  

All sites that ghttech.net links to

D.  

All search engines that link to .net domains

Discussion 0
Question # 12

Which of the following attacks does a hacker perform in order to obtain UDDI information such as businessEntity, businesService, bindingTemplate, and tModel?

Options:

A.  

Web Services Footprinting Attack

B.  

Service Level Configuration Attacks

C.  

URL Tampering Attacks

D.  

Inside Attacks

Discussion 0
Question # 13

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.  

Avoid cross talk

B.  

Avoid over-saturation of wireless signals

C.  

So that the access points will work on different frequencies

D.  

Multiple access points can be set up on the same channel without any issues

Discussion 0
Question # 14

Which of the following acts related to information security in the US establish that the management of an organization is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

Options:

A.  

USA Patriot Act 2001

B.  

Sarbanes-Oxley 2002

C.  

Gramm-Leach-Bliley Act (GLBA)

D.  

California SB 1386

Discussion 0
Question # 15

Which of the following has an offset field that specifies the length of the header and data?

Options:

A.  

IP Header

B.  

UDP Header

C.  

ICMP Header

D.  

TCP Header

Discussion 0
Question # 16

In the context of penetration testing, what does blue teaming mean?

Question # 16

Options:

A.  

A penetration test performed with the knowledge and consent of the organization's IT staff

B.  

It is the most expensive and most widely used

C.  

It may be conducted with or without warning

D.  

A penetration test performed without the knowledge of the organization's IT staff but with permission from upper management

Discussion 0
Question # 17

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

Options:

A.  

Project Goal

B.  

Success Factors

C.  

Objectives

D.  

Assumptions

Discussion 0
Question # 18

Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?

Question # 18

Options:

A.  

ip.dst==10.0.0.7

B.  

ip.port==10.0.0.7

C.  

ip.src==10.0.0.7

D.  

ip.dstport==10.0.0.7

Discussion 0
Question # 19

Besides the policy implications of chat rooms, Internet Relay Chat (IRC) is frequented by attackers and used as a command and control mechanism. IRC normally uses which one of the following TCP ports?

Options:

A.  

6566 TCP port

B.  

6771 TCP port

C.  

6667 TCP port

D.  

6257 TCP port

Discussion 0
Question # 20

A firewall’s decision to forward or reject traffic in network filtering is dependent upon which of the following?

Options:

A.  

Destination address

B.  

Port numbers

C.  

Source address

D.  

Protocol used

Discussion 0
Question # 21

Which one of the following Snort logger mode commands is associated to run a binary log file through Snort in sniffer mode to dump the packets to the screen?

Options:

A.  

./snort -dvr packet.log icmp

B.  

./snort -dev -l ./log

C.  

./snort -dv -r packet.log

D.  

./snort -l ./log –b

Discussion 0
Question # 22

Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?

Options:

A.  

UDP and TCP

B.  

TCP and SMTP

C.  

SMTP

D.  

UDP and SMTP

Discussion 0
Question # 23

: 11

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

Question # 23

Options:

A.  

Client-Side Test Report

B.  

Activity Report

C.  

Host Report

D.  

Vulnerability Report

Discussion 0
Question # 24

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers.

Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

Options:

A.  

net port 22

B.  

udp port 22 and host 172.16.28.1/24

C.  

src port 22 and dst port 22

D.  

src port 23 and dst port 23

Discussion 0
Question # 25

How many bits is Source Port Number in TCP Header packet?

Options:

A.  

48

B.  

32

C.  

64

D.  

16

Discussion 0
Question # 26

John, a penetration tester from a pen test firm, was asked to collect information about the host file in a Windows system directory. Which of the following is the location of the host file in Window system directory?

Options:

A.  

C:\Windows\System32\Boot

B.  

C:\WINNT\system32\drivers\etc

C.  

C:\WINDOWS\system32\cmd.exe

D.  

C:\Windows\System32\restore

Discussion 0
Question # 27

What operating system would respond to the following command?

Question # 27

Options:

A.  

Mac OS X

B.  

Windows XP

C.  

Windows 95

D.  

FreeBSD

Discussion 0
Question # 28

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

Options:

A.  

Filtered

B.  

Stealth

C.  

Closed

D.  

Open

Discussion 0
Question # 29

Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?

Options:

A.  

Decreases consumed employee time and increases system uptime

B.  

Increases detection and reaction time

C.  

Increases response time

D.  

Both Decreases consumed employee time and increases system uptime and Increases response time

Discussion 0
Question # 30

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

Options:

A.  

Connect Scanning Techniques

B.  

SYN Scanning Techniques

C.  

Stealth Scanning Techniques

D.  

Port Scanning Techniques

Discussion 0
Get ECSAv10 dumps and pass your exam in 24 hours!

Free Exams Sample Questions