Month End Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Achieve Success in the ECCouncil ECSAv10 Exam: A Detailed EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing Guide

Questions 1

Which of the following statements is true about the LM hash?

Options:
A.

Disabled in Windows Vista and 7 OSs

B.

Separated into two 8-character strings

C.

Letters are converted to the lowercase

D.

Padded with NULL to 16 characters

ECCouncil ECSAv10 Premium Access
Questions 2

What does ICMP Type 3/Code 13 mean?

Options:
A.

Host Unreachable

B.

Port Unreachable

C.

Protocol Unreachable

D.

Administratively Blocked

Questions 3

Which one of the following is a useful formatting token that takes an int * as an argument, and writes the number of bytes already written, to that location?

Options:
A.

“%n”

B.

“%s”

C.

“%p”

D.

“%w”

Questions 4

To locate the firewall, SYN packet is crafted using Hping or any other packet crafter and sent to the firewall. If ICMP unreachable type 13 message (which is an admin prohibited packet) with a source IP address of the access control device is received, then it means which of the following type of firewall is in place?

Options:
A.

Circuit level gateway

B.

Stateful multilayer inspection firewall

C.

Packet filter

D.

Application level gateway

Questions 5

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and Zombies? What type of Penetration Testing is Larry planning to carry out?

Options:
A.

Internal Penetration Testing

B.

Firewall Penetration Testing

C.

DoS Penetration Testing

D.

Router Penetration Testing

Questions 6

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.

Which firewall would be most appropriate for Harold?

Options:
A.

Application-level proxy firewall

B.

Data link layer firewall

C.

Packet filtering firewall

D.

Circuit-level proxy firewall

Questions 7

HTTP protocol specifies that arbitrary binary characters can be passed within the URL by using %xx notation, where 'xx' is the

Options:
A.

ASCII value of the character

B.

Binary value of the character

C.

Decimal value of the character

D.

Hex value of the character

Questions 8

NO: 72

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information.

You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

Options:
A.

Nmap

B.

Netcraft

C.

Ping sweep

D.

Dig

Questions 9

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

Options:
A.

AES

B.

DES (ECB mode)

C.

MD5

D.

RC5

Questions 10

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?

Options:
A.

XPath Injection Attack

B.

Authorization Attack

C.

Authentication Attack

D.

Frame Injection Attack

Exam Code: ECSAv10
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing
Last Update: Jan 24, 2025
Questions: 201