EC-Council ECSAv10 Exam
EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing (Page 22 )

Updated On: 7-Feb-2026

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

  1. Use attack as a launching point to penetrate deeper into the network
  2. Demonstrate that no system can be protected against DoS attacks
  3. List weak points on their network
  4. Show outdated equipment so it can be replaced

Answer(s): C



What is the target host IP in the following command?

  1. Firewalk does not scan target hosts
  2. 172.16.28.95
  3. This command is using FIN packets, which cannot scan target hosts D. 10.10.150.1

Answer(s): A



Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

  1. AES
  2. DES (ECB mode)
  3. MD5
  4. RC5

Answer(s): C



Which of the following protocols cannot be used to filter VoIP traffic?

  1. Media Gateway Control Protocol (MGCP)
  2. Real-time Transport Control Protocol (RTCP)
  3. Session Description Protocol (SDP)
  4. Real-Time Publish Subscribe (RTPS)

Answer(s): D



What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques
  2. SYN Scanning Techniques
  3. Stealth Scanning Techniques
  4. Port Scanning Techniques

Answer(s): C



Viewing page 22 of 42
Viewing questions 106 - 110 out of 203 questions



Post your Comments and Discuss EC-Council ECSAv10 exam prep with other Community members:

Join the ECSAv10 Discussion