Eccouncil ECSAv10 Certified Security Analyst (ECSA) v10 ECSA v10 Exam Practice Test

Page: 1 / 14
Total 201 questions
Question 1

Information gathering is performed to:

i) Collect basic information about the target company and its network

ii) Determine the operating system used, platforms running, web server versions, etc.

iii) Find vulnerabilities and exploits

Which of the following pen testing tests yields information about a company's technology infrastructure?



Answer : D


Question 2

Which of the following shields Internet users from artificial DNS data, such as a deceptive or mischievous address instead of the genuine address that was requested?



Answer : A


Question 3

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?



Answer : D


Question 4

Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?



Answer : D


Question 5

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

http://172.168.4.131/level/99/exec/show/config

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?



Answer : C


Question 6

One needs to run ''Scan Server Configuration'' tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured.

By default, the Nessus daemon listens to connections on which one of the following?



Answer : A


Question 7

Which one of the following 802.11 types uses either FHSS or DSSS for modulation?



Answer : D


Page:    1 / 14   
Total 201 questions