Eccouncil Certified Security Analyst (ECSA) v10 ECSAv10 ECSA v10 Exam Questions

Page: 1 / 14
Total 201 questions
Question 1

Which of the following policies helps secure data and protects the privacy of organizational information?



Answer : C


Question 2

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.

What are the two types of 'white-box' penetration testing?



Answer : D


Question 3

NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network. Which one of the following ports is used by NTP as its transport layer?



Answer : C


Question 4

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?



Answer : B


Question 5

A Demilitarized Zone (DMZ) is a computer host or small network inserted as a ''neutral zone'' between a company's private network and the outside public network. Usage of a protocol within a DMZ environment is highly variable based on the specific needs of an organization.

Privilege escalation, system is compromised when the code runs under root credentials, and DoS attacks are the basic weakness of which one of the following Protocol?



Answer : D


Question 6

Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?



Answer : D


Question 7

You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?



Answer : C


Page:    1 / 14   
Total 201 questions