Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

ECSAv10 EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

ECSAv10 Practice Questions

EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

Last Update 1 day ago
Total Questions : 201

Dive into our fully updated and stable ECSAv10 practice test platform, featuring all the latest ECSA exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECSA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about ECSAv10. Use this test to pinpoint which areas you need to focus your study on.

ECSAv10 PDF

ECSAv10 PDF (Printable)
$43.75
$124.99

ECSAv10 Testing Engine

ECSAv10 PDF (Printable)
$50.75
$144.99

ECSAv10 PDF + Testing Engine

ECSAv10 PDF (Printable)
$63.7
$181.99
Question # 21

Which one of the following Snort logger mode commands is associated to run a binary log file through Snort in sniffer mode to dump the packets to the screen?

Options:

A.  

./snort -dvr packet.log icmp

B.  

./snort -dev -l ./log

C.  

./snort -dv -r packet.log

D.  

./snort -l ./log –b

Discussion 0
Question # 22

Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?

Options:

A.  

UDP and TCP

B.  

TCP and SMTP

C.  

SMTP

D.  

UDP and SMTP

Discussion 0
Question # 23

: 11

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

Question # 23

Options:

A.  

Client-Side Test Report

B.  

Activity Report

C.  

Host Report

D.  

Vulnerability Report

Discussion 0
Question # 24

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers.

Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

Options:

A.  

net port 22

B.  

udp port 22 and host 172.16.28.1/24

C.  

src port 22 and dst port 22

D.  

src port 23 and dst port 23

Discussion 0
Question # 25

How many bits is Source Port Number in TCP Header packet?

Options:

A.  

48

B.  

32

C.  

64

D.  

16

Discussion 0
Question # 26

John, a penetration tester from a pen test firm, was asked to collect information about the host file in a Windows system directory. Which of the following is the location of the host file in Window system directory?

Options:

A.  

C:\Windows\System32\Boot

B.  

C:\WINNT\system32\drivers\etc

C.  

C:\WINDOWS\system32\cmd.exe

D.  

C:\Windows\System32\restore

Discussion 0
Question # 27

What operating system would respond to the following command?

Question # 27

Options:

A.  

Mac OS X

B.  

Windows XP

C.  

Windows 95

D.  

FreeBSD

Discussion 0
Question # 28

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

Options:

A.  

Filtered

B.  

Stealth

C.  

Closed

D.  

Open

Discussion 0
Question # 29

Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?

Options:

A.  

Decreases consumed employee time and increases system uptime

B.  

Increases detection and reaction time

C.  

Increases response time

D.  

Both Decreases consumed employee time and increases system uptime and Increases response time

Discussion 0
Question # 30

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

Options:

A.  

Connect Scanning Techniques

B.  

SYN Scanning Techniques

C.  

Stealth Scanning Techniques

D.  

Port Scanning Techniques

Discussion 0
Get ECSAv10 dumps and pass your exam in 24 hours!

Free Exams Sample Questions