Free ECSAv10 Exam Braindumps (page: 27)

Page 26 of 52

Identify the attack represented in the diagram below:

  1. Input Validation
  2. Session Hijacking
  3. SQL Injection
  4. Denial-of-Service

Answer(s): B



What does ICMP Type 3/Code 13 mean?

  1. Host Unreachable
  2. Port Unreachable
  3. Protocol Unreachable
  4. Administratively Blocked

Answer(s): D



A penetration test consists of three phases: pre-attack phase, attack phase, and post-attack phase.



Active reconnaissance which includes activities such as network mapping, web profiling, and perimeter mapping is a part which phase(s)?

  1. Post-attack phase
  2. Pre-attack phase and attack phase
  3. Attack phase
  4. Pre-attack phase

Answer(s): D



You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses.
You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

  1. Metamorphic
  2. Oligomorhic
  3. Polymorphic
  4. Transmorphic

Answer(s): A






Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

ECSAv10 Discussions & Posts