New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

412-79v10 EC-Council Certified Security Analyst (ECSA) V10 Questions and Answers

Questions 4

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame.

What ports should you open for SNMP to work through Firewalls.

(Select 2)

Options:

A.

162

B.

160

C.

161

D.

163

Buy Now
Questions 5

Information gathering is performed to:

i) Collect basic information about the target company and its network

ii) Determine the operating system used, platforms running, web server versions, etc.

iii) Find vulnerabilities and exploits

Which of the following pen testing tests yields information about a company’s technology infrastructure?

Options:

A.

Searching for web page posting patterns

B.

Analyzing the link popularity of the company’s website

C.

Searching for trade association directories

D.

Searching for a company’s job postings

Buy Now
Questions 6

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast.

On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently.

What could be Tyler issue with his home wireless network?

Options:

A.

2.4 Ghz Cordless phones

B.

Satellite television

C.

CB radio

D.

Computers on his wired network

Buy Now
Questions 7

You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?

Options:

A.

Analyzing, categorizing and prioritizing resources

B.

Evaluating the existing perimeter and internal security

C.

Checking for a written security policy

D.

Analyzing the use of existing management and control architecture

Buy Now
Questions 8

Which type of vulnerability assessment tool provides security to the IT system by testing for vulnerabilities in the applications and operation system?

Options:

A.

Active/Passive Tools

B.

Application-layer Vulnerability Assessment Tools

C.

Location/Data Examined Tools

D.

Scope Assessment Tools

Buy Now
Questions 9

A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:

Options:

A.

Microsoft Internet Security Framework

B.

Information System Security Assessment Framework (ISSAF)

C.

Bell Labs Network Security Framework

D.

The IBM Security Framework

Buy Now
Questions 10

What is a good security method to prevent unauthorized users from "tailgating"?

Options:

A.

Electronic key systems

B.

Man trap

C.

Pick-resistant locks

D.

Electronic combination locks

Buy Now
Questions 11

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum.

Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

Which of the following ICMP messages will be generated if the destination port is not reachable?

Options:

A.

ICMP Type 11 code 1

B.

ICMP Type 5 code 3

C.

ICMP Type 3 code 2

D.

ICMP Type 3 code 3

Buy Now
Questions 12

Which of the following has an offset field that specifies the length of the header and data?

Options:

A.

IP Header

B.

UDP Header

C.

ICMP Header

D.

TCP Header

Buy Now
Questions 13

Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?

Options:

A.

Special-Access Policy

B.

User Identification and Password Policy

C.

Personal Computer Acceptable Use Policy

D.

User-Account Policy

Buy Now
Questions 14

What is the following command trying to accomplish?

Options:

A.

Verify that NETBIOS is running for the 192.168.0.0 network

B.

Verify that TCP port 445 is open for the 192.168.0.0 network

C.

Verify that UDP port 445 is open for the 192.168.0.0 network

D.

Verify that UDP port 445 is closed for the 192.168.0.0 networks

Buy Now
Questions 15

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

Options:

A.

Client-Side Test Report

B.

Activity Report

C.

Host Report

D.

Vulnerability Report

Buy Now
Questions 16

Metasploit framework in an open source platform for vulnerability research, development, and penetration testing. Which one of the following metasploit options is used to exploit multiple systems at once?

Options:

A.

NinjaDontKill

B.

NinjaHost

C.

RandomNops

D.

EnablePython

Buy Now
Questions 17

John, the penetration testing manager in a pen testing firm, needs to prepare a pen testing pricing report for a client. Which of the following factors does he need to consider while preparing the pen testing pricing report?

Options:

A.

Number of employees in the client organization

B.

Complete structure of the organization

C.

Number of client computers to be tested and resources required to perform a pen test

D.

Number of servers available in the client organization

Buy Now
Questions 18

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

Options:

A.

IPS evasion technique

B.

IDS evasion technique

C.

UDP evasion technique

D.

TTL evasion technique

Buy Now
Questions 19

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

Options:

A.

intitle:"exchange server"

B.

outlook:"search"

C.

locate:"logon page"

D.

allinurl:"exchange/logon.asp"

Buy Now
Questions 20

Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

Options:

A.

California SB 1386

B.

Sarbanes-Oxley 2002

C.

Gramm-Leach-Bliley Act (GLBA)

D.

USA Patriot Act 2001

Buy Now
Questions 21

The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems.

Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?

Options:

A.

Active Information Gathering

B.

Pseudonymous Information Gathering

C.

Anonymous Information Gathering

D.

Open Source or Passive Information Gathering

Buy Now
Questions 22

From where can clues about the underlying application environment can be collected?

Options:

A.

From source code

B.

From file types and directories

C.

From executable file

D.

From the extension of the file

Buy Now
Questions 23

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

Options:

A.

OSPF

B.

BPG

C.

ATM

D.

UDP

Buy Now
Questions 24

Vulnerability assessment is an examination of the ability of a system or application, including the current security procedures and controls, to withstand assault.

What does a vulnerability assessment identify?

Options:

A.

Disgruntled employees

B.

Weaknesses that could be exploited

C.

Physical security breaches

D.

Organizational structure

Buy Now
Questions 25

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.

Avoid cross talk

B.

Avoid over-saturation of wireless signals

C.

So that the access points will work on different frequencies

D.

Multiple access points can be set up on the same channel without any issues

Buy Now
Questions 26

What is the difference between penetration testing and vulnerability testing?

Options:

A.

Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’

B.

Penetration testing is based on purely online vulnerability analysis while vulnerability testing engages ethical hackers to find vulnerabilities

C.

Vulnerability testing is more expensive than penetration testing

D.

Penetration testing is conducted purely for meeting compliance standards while vulnerability testing is focused on online scans

Buy Now
Questions 27

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

include

#include

int main(int argc, char *argv[])

{

char buffer[10];

if (argc < 2)

{

fprintf(stderr, "USAGE: %s string\n", argv[0]);

return 1;

}

strcpy(buffer, argv[1]);

return 0;

}

Options:

A.

Buffer overflow

B.

Format string bug

C.

Kernal injection

D.

SQL injection

Buy Now
Questions 28

SQL injection attack consists of insertion or "injection" of either a partial or complete SQL query via the data input or transmitted from the client (browser) to the web application. A successful SQL injection attack can:

i) Read sensitive data from the database

iii) Modify database data (insert/update/delete)

iii) Execute administration operations on the database (such as shutdown the DBMS)

iV) Recover the content of a given file existing on the DBMS file system or write files into the file system

v) Issue commands to the operating system

Pen tester needs to perform various tests to detect SQL injection vulnerability. He has to make a list of all input fields whose values could be used in crafting a SQL query, including the hidden fields of POST requests and then test them separately, trying to interfere with the query and to generate an error.

In which of the following tests is the source code of the application tested in a non-runtime environment to detect the SQL injection vulnerabilities?

Options:

A.

Automated Testing

B.

Function Testing

C.

Dynamic Testing

D.

Static Testing

Buy Now
Questions 29

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.

What type of firewall must you implement to abide by this policy?

Options:

A.

Circuit-level proxy firewall

B.

Packet filtering firewall

C.

Application-level proxy firewall

D.

Statefull firewall

Buy Now
Questions 30

Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?

Options:

A.

Vulnerabilities checklists

B.

Configuration checklists

C.

Action Plan

D.

Testing Plan

Buy Now
Exam Code: 412-79v10
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Dec 21, 2024
Questions: 201

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99