Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing Question and Answers

EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

Last Update Apr 24, 2024
Total Questions : 201

We are offering FREE ECSAv10 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare ECSAv10 free exam questions and then go for complete pool of EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing test questions that will help you more.

ECSAv10 pdf

ECSAv10 PDF

$35  $99.99
ECSAv10 Engine

ECSAv10 Testing Engine

$42  $119.99
ECSAv10 PDF + Engine

ECSAv10 PDF + Testing Engine

$56  $159.99
Questions 1

: 11

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

Options:

A.  

Client-Side Test Report

B.  

Activity Report

C.  

Host Report

D.  

Vulnerability Report

Discussion 0
Questions 2

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and Zombies? What type of Penetration Testing is Larry planning to carry out?

Options:

A.  

Internal Penetration Testing

B.  

Firewall Penetration Testing

C.  

DoS Penetration Testing

D.  

Router Penetration Testing

Discussion 0
Questions 3

O: 18

Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible.

Paulette presents the following screenshot to her boss so he can inform the clients about necessary changes need to be made. From the screenshot, what changes should the client company make?

Exhibit:

Options:

A.  

The banner should not state "only authorized IT personnel may proceed"

B.  

Remove any identifying numbers, names, or version information

C.  

The banner should include the Cisco tech support contact information as well

D.  

The banner should have more detail on the version numbers for the network equipment

Discussion 0
Questions 4

Snort, an open source network-based intrusion detection sensor, is the most widely installed NIDS in the world. It can be configured to run in the four modes. Which one of the following modes reads the packets off the network and displays them in a continuous stream on the console (screen)?

Options:

A.  

Packet Sniffer Mode

B.  

Packet Logger Mode

C.  

Network Intrusion Detection System Mode

D.  

Inline Mode

Discussion 0
Questions 5

In Linux, what is the smallest possible shellcode?

Options:

A.  

800 bytes

B.  

8 bytes

C.  

80 bytes

D.  

24 bytes

Discussion 0
Questions 6

Rule of Engagement (ROE) is the formal permission to conduct a pen-test. It provides top-level guidance for conducting the penetration testing. Various factors are considered while preparing the scope of ROE which clearly explain the limits associated with the security test.

Which of the following factors is NOT considered while preparing the scope of the Rules of Engagment (ROE)?

Options:

A.  

A list of employees in the client organization

B.  

A list of acceptable testing techniques

C.  

Specific IP addresses/ranges to be tested

D.  

Points of contact for the penetration testing team

Discussion 0
Questions 7

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.

What are the two types of ‘white-box’ penetration testing?

Options:

A.  

Announced testing and blind testing

B.  

Blind testing and double blind testing

C.  

Blind testing and unannounced testing

D.  

Announced testing and unannounced testing

Discussion 0
Questions 8

Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?

Options:

A.  

Microsoft Baseline Security Analyzer (MBSA)

B.  

CORE Impact

C.  

Canvas

D.  

Network Security Analysis Tool (NSAT)

Discussion 0
Questions 9

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

Options:

A.  

Server Side Includes

B.  

Sort Server Includes

C.  

Server Sort Includes

D.  

Slide Server Includes

Discussion 0
Questions 10

Identify the attack represented in the diagram below:

Options:

A.  

Input Validation

B.  

Session Hijacking

C.  

SQL Injection

D.  

Denial-of-Service

Discussion 0
Questions 11

What are the 6 core concepts in IT security?

Options:

A.  

Server management, website domains, firewalls, IDS, IPS, and auditing

B.  

Authentication, authorization, confidentiality, integrity, availability, and non-repudiation

C.  

Passwords, logins, access controls, restricted domains, configurations, and tunnels

D.  

Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans

Discussion 0
Questions 12

During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?

Options:

A.  

Examine Source of the Available Pages

B.  

Perform Web Spidering

C.  

Perform Banner Grabbing

D.  

Check the HTTP and HTML Processing by the Browser

Discussion 0
Questions 13

To locate the firewall, SYN packet is crafted using Hping or any other packet crafter and sent to the firewall. If ICMP unreachable type 13 message (which is an admin prohibited packet) with a source IP address of the access control device is received, then it means which of the following type of firewall is in place?

Options:

A.  

Circuit level gateway

B.  

Stateful multilayer inspection firewall

C.  

Packet filter

D.  

Application level gateway

Discussion 0
Questions 14

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.

How would you answer?

Options:

A.  

IBM Methodology

B.  

LPT Methodology

C.  

Google Methodology

D.  

Microsoft Methodology

Discussion 0
Questions 15

NO: 35

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

Options:

A.  

IPS evasion technique

B.  

IDS evasion technique

C.  

UDP evasion technique

D.  

TTL evasion technique

Discussion 0
Questions 16

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the Restrict Anonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server.

Using User info tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

Options:

A.  

Restrict Anonymous must be set to "2" for complete security

B.  

Restrict Anonymous must be set to "3" for complete security

C.  

There is no way to always prevent an anonymous null session from establishing

D.  

Restrict Anonymous must be set to "10" for complete security

Discussion 0
Questions 17

Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.

Options:

A.  

Information-Protection Policy

B.  

Special-Access Policy

C.  

Remote-Access Policy

D.  

Acceptable-Use Policy

Discussion 0
Questions 18

Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?

Options:

A.  

UDP and TCP

B.  

TCP and SMTP

C.  

SMTP

D.  

UDP and SMTP

Discussion 0
Questions 19

One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured.

By default, the Nessus daemon listens to connections on which one of the following?

Options:

A.  

Localhost (127.0.0.1) and port 1241

B.  

Localhost (127.0.0.1) and port 1240

C.  

Localhost (127.0.0.1) and port 1246

D.  

Localhost (127.0.0.0) and port 1243

Discussion 0
Questions 20

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum.

Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

Which of the following ICMP messages will be generated if the destination port is not reachable?

Options:

A.  

ICMP Type 11 code 1

B.  

ICMP Type 5 code 3

C.  

ICMP Type 3 code 2

D.  

ICMP Type 3 code 3

Discussion 0
Questions 21

Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

Options:

A.  

California SB 1386

B.  

Sarbanes-Oxley 2002

C.  

Gramm-Leach-Bliley Act (GLBA)

D.  

USA Patriot Act 2001

Discussion 0
Questions 22

Why is a legal agreement important to have before launching a penetration test?

Options:

A.  

Guarantees your consultant fees

B.  

Allows you to perform a penetration test without the knowledge and consent of the organization's upper management

C.  

It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.

D.  

It is important to ensure that the target organization has implemented mandatory security policies

Discussion 0
Questions 23

The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networks is:

Options:

A.  

Nortells Unified Security Framework

B.  

The IBM Security Framework

C.  

Bell Labs Network Security Framework

D.  

Microsoft Internet Security Framework

Discussion 0
Questions 24

Output modules allow Snort to be much more flexible in the formatting and presentation of output to its users. Snort has 9 output plug-ins that push out data in different formats. Which one of the following output plug-ins allows alert data to be written in a format easily importable to a database?

Options:

A.  

unified

B.  

csv

C.  

alert_unixsock

D.  

alert_fast

Discussion 0
Questions 25

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.

link:www.ghttech.net

What will this search produce?

Options:

A.  

All sites that link to ghttech.net

B.  

Sites that contain the code: link:www.ghttech.net

C.  

All sites that ghttech.net links to

D.  

All search engines that link to .net domains

Discussion 0
Questions 26

One of the steps in information gathering is to run searches on a company using complex keywords in Google.

Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?

Options:

A.  

ROCHESTON fileformat:+ppt

B.  

ROCHESTON ppt:filestring

C.  

ROCHESTON filetype:ppt

D.  

ROCHESTON +ppt:filesearch

Discussion 0
Questions 27

Which one of the following is a supporting tool for 802.11 (wireless) packet injections, it spoofs 802.11 packets to verify whether the access point is valid or not?

Options:

A.  

Airsnort

B.  

Aircrack

C.  

Airpwn

D.  

WEPCrack

Discussion 0
Questions 28

Which of the following statements is true about the LM hash?

Options:

A.  

Disabled in Windows Vista and 7 OSs

B.  

Separated into two 8-character strings

C.  

Letters are converted to the lowercase

D.  

Padded with NULL to 16 characters

Discussion 0
Questions 29

Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?

Options:

A.  

Wireshark: Capinfos

B.  

Wireshark: Tcpdump

C.  

Wireshark: Text2pcap

D.  

Wireshark: Dumpcap

Discussion 0
Questions 30

Which of the following is not the SQL injection attack character?

Options:

A.  

$

B.  

PRINT

C.  

#

D.  

@@variable

Discussion 0