Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > EC-COUNCIL > EC-COUNCIL Certifications > ECSAV10 > ECSAV10 Online Practice Questions and Answers

ECSAV10 Online Practice Questions and Answers

Questions 4

An organization deployed Microsoft Azure cloud services for running their business activities. They appointed Jamie, a security analyst for performing cloud penetration testing. Microsoft prohibits certain tests to be carried out on their platform. Which of the following penetration testing activities Jamie cannot perform on the Microsoft Azure cloud service?

A. Post scanning

B. Denial-of-Service

C. Log monitoring

D. Load testing

Buy Now

Correct Answer: B

Questions 5

Nick is a penetration tester in Stanbiz Ltd. As a part of his duty, he was analyzing the network traffic by

using various filters in the Wireshark tool. While sniffing the network traffic, he used "tcp.port==1433"

Wireshark filter for acquiring a specific database related information since port number 1433 is the default

port of that specific target database.

Which of the following databases Nick is targeting in his test?

A. PostgreSQL

B. Oracle

C. MySQL

D. Microsoft SQL Server

Buy Now

Correct Answer: D

Questions 6

What is the objective of the following bash script?

A. It gives a list of IP addresses that have an FTP port open

B. It tries to connect to FTP port on a target machine C. It checks if a target host has the FTP port open and quits

D. It checks if an FTP port on a target machine is vulnerable to arracks

Buy Now

Correct Answer: A

Questions 7

An attacker with a malicious intention decided to hack confidential data from the target organization. For acquiring such information, he started testing IoT devices that are connected to the target network. He started monitoring the network traffic passing between the IoT devices and the network to verify whether credentials are being transmitted in clear text. Further, he also tried to crack the passwords using well-known keywords across all the interfaces. Which of the following IoT threats the attacker is trying to exploit?

A. Poor physical security

B. Poor authentication

C. Privacy concerns

D. Insecure firmware

Buy Now

Correct Answer: B

Questions 8

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

A. Poison the switch's MAC address table by flooding it with ACK bits

B. Enable tunneling feature on the switch

C. Trick the switch into thinking it already has a session with Terri's computer

D. Crash the switch with a DoS attack since switches cannot send ACK bits

Buy Now

Correct Answer: C

Questions 9

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/show/config After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

A. URL Obfuscation Arbitrary Administrative Access Vulnerability

B. Cisco IOS Arbitrary Administrative Access Online Vulnerability

C. HTTP Configuration Arbitrary Administrative Access Vulnerability

D. HTML Configuration Arbitrary Administrative Access Vulnerability

Buy Now

Correct Answer: C

Questions 10

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

A. Avoid cross talk

B. Avoid over-saturation of wireless signals

C. So that the access points will work on different frequencies

D. Multiple access points can be set up on the same channel without any issues

Buy Now

Correct Answer: A

Questions 11

Amazon, an IT based company, conducts a survey on the usage of the Internet. They found that company employees spend most of the time at work surfing the web for their personal use and for inappropriate web site viewing. Management decide to block all such web sites using URL filtering software.

How can employees continue to see the blocked websites?

A. Using session hijacking

B. Using proxy servers

C. Using authentication

D. Using encryption

Buy Now

Correct Answer: B

Questions 12

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

A. Passive IDS

B. Active IDS

C. Progressive IDS

D. NIPS

Buy Now

Correct Answer: B

Questions 13

The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networks is:

A. Nortells Unified Security Framework

B. The IBM Security Framework

C. Bell Labs Network Security Framework

D. Microsoft Internet Security Framework

Buy Now

Correct Answer: C

Exam Code: ECSAV10
Exam Name: EC-Council Certified Security Analyst (ECSA) v10
Last Update: Jun 09, 2025
Questions: 354

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.