EC-Council ECSAv10 Exam Questions
EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing (Page 5 )

Updated On: 24-Feb-2026

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?

  1. Threat-Assessment Phase
  2. Pre-Assessment Phase
  3. Assessment Phase
  4. Post-Assessment Phase

Answer(s): B



What are the security risks of running a "repair" installation for Windows XP?

  1. There are no security risks when running the "repair" installation for Windows XP
  2. Pressing Shift+F1 gives the user administrative rights
  3. Pressing Ctrl+F10 gives the user administrative rights
  4. Pressing Shift+F10 gives the user administrative rights

Answer(s): D



Software firewalls work at which layer of the OSI model?

  1. Data Link
  2. Network
  3. Transport
  4. Application

Answer(s): A



The Internet is a giant database where people store some of their most private information on the cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS attacks, website defacement, lost computers, accidental publishing, and more have all been sources of major leaks over the last 15 years.



What is the biggest source of data leaks in organizations today?

  1. Weak passwords and lack of identity management
  2. Insufficient IT security budget
  3. Rogue employees and insider attacks
  4. Vulnerabilities, risks, and threats facing Web sites

Answer(s): C



Which one of the following log analysis tools is used for analyzing the server's log files?

  1. Performance Analysis of Logs tool
  2. Network Sniffer Interface Test tool
  3. Ka Log Analyzer tool
  4. Event Log Tracker tool

Answer(s): C






Post your Comments and Discuss EC-Council ECSAv10 exam dumps with other Community members:

Join the ECSAv10 Discussion