Free ECSAv10 Exam Braindumps (page: 21)

Page 20 of 52

Identify the person who will lead the penetration-testing project and be the client point of contact.

  1. Database Penetration Tester
  2. Policy Penetration Tester
  3. Chief Penetration Tester
  4. Application Penetration Tester

Answer(s): C



One of the steps in information gathering is to run searches on a company using complex keywords in Google.



Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?

  1. ROCHESTON fileformat:+ppt
  2. ROCHESTON ppt:filestring
  3. ROCHESTON filetype:ppt
  4. ROCHESTON +ppt:filesearch

Answer(s): C



Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs.
One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named "Access Point Detection". This plug-in uses four techniques to identify the presence of a WAP. Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?

  1. NMAP TCP/IP fingerprinting
  2. HTTP fingerprinting
  3. FTP fingerprinting
  4. SNMP fingerprinting

Answer(s): C



Which of the following is not the SQL injection attack character?

  1. $
  2. PRINT
  3. #
  4. @@variable

Answer(s): A






Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

ECSAv10 Discussions & Posts