Eccouncil ECSAv10 Certified Security Analyst (ECSA) v10 ECSA v10 Exam Practice Test

Page: 1 / 14
Total 201 questions
Question 1

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?



Answer : C


Question 2

Which one of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?



Answer : C


Question 3

Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?



Answer : A


Question 4

Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?



Answer : B


Question 5

Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?



Answer : C


Question 6

In the context of penetration testing, what does blue teaming mean?



Answer : A


Question 7

Information gathering is performed to:

i) Collect basic information about the target company and its network

ii) Determine the operating system used, platforms running, web server versions, etc.

iii) Find vulnerabilities and exploits

Which of the following pen testing tests yields information about a company's technology infrastructure?



Answer : D


Page:    1 / 14   
Total 201 questions