Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

Last Update 19 hours ago Total Questions : 201

The EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include ECSAv10 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ECSAv10 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ECSAv10 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing practice test comfortably within the allotted time.

Question # 4

The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.

What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

A.

Phishing

B.

Spoofing

C.

Tapping

D.

Vishing

Question # 5

Which of the following scan option is able to identify the SSL services?

A.

–sS

B.

–sV

C.

–sU

D.

–sT

Question # 6

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.

link:www.ghttech.net

What will this search produce?

A.

All sites that link to ghttech.net

B.

Sites that contain the code: link:www.ghttech.net

C.

All sites that ghttech.net links to

D.

All search engines that link to .net domains

Question # 7

Which of the following has an offset field that specifies the length of the header and data?

A.

IP Header

B.

UDP Header

C.

ICMP Header

D.

TCP Header

Question # 8

Which one of the following is a supporting tool for 802.11 (wireless) packet injections, it spoofs 802.11 packets to verify whether the access point is valid or not?

A.

Airsnort

B.

Aircrack

C.

Airpwn

D.

WEPCrack

Question # 9

ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead.

ARP spoofing attack is used as an opening for other attacks.

What type of attack would you launch after successfully deploying ARP spoofing?

A.

Parameter Filtering

B.

Social Engineering

C.

Input Validation

D.

Session Hijacking

Question # 10

Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?

A.

Service-based Assessment Solutions

B.

Product-based Assessment Solutions

C.

Tree-based Assessment

D.

Inference-based Assessment

Go to page: