Free ECSAv10 Exam Braindumps (page: 8)

Page 8 of 52

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.
How would you answer?

  1. IBM Methodology
  2. LPT Methodology
  3. Google Methodology
  4. Microsoft Methodology

Answer(s): B



Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

  1. Project Goal
  2. Success Factors
  3. Objectives
  4. Assumptions

Answer(s): D



You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

  1. Use attack as a launching point to penetrate deeper into the network
  2. Demonstrate that no system can be protected against DoS attacks
  3. List weak points on their network
  4. Show outdated equipment so it can be replaced

Answer(s): C



What is the target host IP in the following command?

  1. Firewalk does not scan target hosts
  2. 172.16.28.95
  3. This command is using FIN packets, which cannot scan target hosts D. 10.10.150.1

Answer(s): A



Page 8 of 52



Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

Calisto MF Moniz commented on October 12, 2024
No comment for this form for the time being.
Anonymous
upvote

Calisto MF Moniz commented on October 12, 2024
Good mechanism for Security expertise practices!
Anonymous
upvote

Raymond commented on July 06, 2021
This is my second purchase. I passed first exam already.
MEXICO
upvote