EC-Council ECSAv10 Exam Questions
EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing (Page 4 )

Updated On: 24-Feb-2026

Which one of the following 802.11 types uses either FHSS or DSSS for modulation?

  1. 802.11b
  2. 802.11a
  3. 802.11n
  4. 802.11-Legacy

Answer(s): D



Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?

  1. SYN Scan
  2. Connect() scan
  3. XMAS Scan
  4. Null Scan

Answer(s): A



Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

  1. California SB 1386
  2. Sarbanes-Oxley 2002
  3. Gramm-Leach-Bliley Act (GLBA)
  4. USA Patriot Act 2001

Answer(s): A



DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories. Identify the attacks that fall under Passive attacks category.

  1. Wardriving
  2. Spoofing
  3. Sniffing
  4. Network Hijacking

Answer(s): A



Which of the following attacks does a hacker perform in order to obtain UDDI information such as businessEntity, businesService, bindingTemplate, and tModel?

  1. Web Services Footprinting Attack
  2. Service Level Configuration Attacks
  3. URL Tampering Attacks
  4. Inside Attacks

Answer(s): A






Post your Comments and Discuss EC-Council ECSAv10 exam dumps with other Community members:

Join the ECSAv10 Discussion