EC-Council ECSAv10 Exam Questions
EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing (Page 7 )

Updated On: 24-Feb-2026

The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU. The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram.
IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination, identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.



The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram. This value is a:

  1. Multiple of four bytes
  2. Multiple of two bytes
  3. Multiple of eight bytes
  4. Multiple of six bytes

Answer(s): C



Variables are used to define parameters for detection, specifically those of your local network and/or specific servers or ports for inclusion or exclusion in rules. These are simple substitution variables set with the var keyword. Which one of the following operator is used to define meta-variables?

  1. "$"
  2. "#"
  3. "*"
  4. "?"

Answer(s): A



Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?

  1. ip.dst==10.0.0.7
  2. ip.port==10.0.0.7
  3. ip.src==10.0.0.7
  4. ip.dstport==10.0.0.7

Answer(s): C



You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.
How would you answer?

  1. IBM Methodology
  2. LPT Methodology
  3. Google Methodology
  4. Microsoft Methodology

Answer(s): B



Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

  1. Project Goal
  2. Success Factors
  3. Objectives
  4. Assumptions

Answer(s): D






Post your Comments and Discuss EC-Council ECSAv10 exam dumps with other Community members:

Join the ECSAv10 Discussion