Free ECSAv10 Exam Braindumps (page: 20)

Page 20 of 52

Identify the person who will lead the penetration-testing project and be the client point of contact.

  1. Database Penetration Tester
  2. Policy Penetration Tester
  3. Chief Penetration Tester
  4. Application Penetration Tester

Answer(s): C



One of the steps in information gathering is to run searches on a company using complex keywords in Google.



Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?

  1. ROCHESTON fileformat:+ppt
  2. ROCHESTON ppt:filestring
  3. ROCHESTON filetype:ppt
  4. ROCHESTON +ppt:filesearch

Answer(s): C



Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs.
One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named "Access Point Detection". This plug-in uses four techniques to identify the presence of a WAP. Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?

  1. NMAP TCP/IP fingerprinting
  2. HTTP fingerprinting
  3. FTP fingerprinting
  4. SNMP fingerprinting

Answer(s): C



Which of the following is not the SQL injection attack character?

  1. $
  2. PRINT
  3. #
  4. @@variable

Answer(s): A



Page 20 of 52



Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

Calisto MF Moniz commented on October 12, 2024
No comment for this form for the time being.
Anonymous
upvote

Calisto MF Moniz commented on October 12, 2024
Good mechanism for Security expertise practices!
Anonymous
upvote

Raymond commented on July 06, 2021
This is my second purchase. I passed first exam already.
MEXICO
upvote