Eccouncil Certified Security Analyst (ECSA) v10 ECSAv10 ECSA v10 Exam Practice Test

Page: 1 / 14
Total 201 questions
Question 1

The objective of this act was to protect consumers personal financial information held by financial institutionsand their service providers.



Answer : C


Question 2

Firewall and DMZ architectures are characterized according to its design. Which one of the following architectures is used when routers have better high-bandwidth data stream handling capacity?



Answer : A


Question 3

Identify the correct formula for Return on Investment (ROI).



Answer : C


Question 4

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?



Answer : B


Question 5

How many possible sequence number combinations are there in TCP/IP protocol?



Answer : C


Question 6

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.

What are the two types of 'white-box' penetration testing?



Answer : D


Question 7

Variables are used to define parameters for detection, specifically those of your local network and/or specific servers or ports for inclusion or exclusion in rules. These are simple substitution variables set with the var keyword.

Which one of the following operator is used to define meta-variables?



Answer : A


Page:    1 / 14   
Total 201 questions