EC-Council ECSAv10 EC-Council Certified Security Analyst Online Training
EC-Council ECSAv10 Online Training
The questions for ECSAv10 were last updated at Nov 23,2024.
- Exam Code: ECSAv10
- Exam Name: EC-Council Certified Security Analyst
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
What is the purpose of the Traceroute command?
- A . For extracting information about the network topology, trusted routers, and firewall locations
- B . For extracting information about closed ports
- C . For extracting information about the server functioning
- D . For extracting information about opened ports
Which port does DHCP use for client connections?
- A . UDP port 67
- B . UDP port 68
- C . UDP port 69
- D . UDP port 66
Rebecca, a security analyst, was auditing the network in her organization. During the scan, she found a service running on a remote host, which helped her to enumerate information related to user accounts, network interfaces, network routing and TCP connections.
Which among the following services allowed Rebecca to enumerate the information?
- A . NTP
- B . SNMP
- C . SMPT
- D . SMB
In delivering penetration testing report, which of the following steps should NOT be followed?
- A . Always send the report by email or CD-ROM
- B . Always deliver the report to approved stakeholders in the company in person
- C . Always ask for a signed acknowledgment after submitting the report
- D . Report must be presented in a PDF format, unless requested otherwise
AB Cloud services provide virtual platform services for the users in addition to storage. The company offers users with APIs, core connectivity and delivery, abstraction and hardware as part of the service.
What is the name of the service AB Cloud services offer?
- A . Web Application Services
- B . Platform as a service (PaaS)
- C . Infrastructure as a service (IaaS)
- D . Software as a service (SaaS)
Jason is a penetration tester, and after completing the initial penetration test, he wanted to create a final penetration test report that consists of all activities performed throughout the penetration testing process.
Before creating the final penetration testing report, which of the following reports should Jason prepare in order to verify if any crucial information is missed from the report?
- A . Activity report
- B . Host report
- C . User report
- D . Draft report
The penetration testers are required to follow predefined standard frameworks in making penetration testing reporting formats.
Which of the following standards does NOT follow the commonly used methodologies in penetration testing?
- A . National Institute of Standards and Technology (NIST)
- B . Information Systems Security Assessment Framework (ISSAF)
- C . Open Web Application Security Project (OWASP)
- D . American Society for Testing Materials (ASTM)
You have implemented DNSSEC on your primary internal DNS server to protect it from various DNS attacks. Network users complained they are not able to resolve domain names to IP addresses at certain times.
What could be the probable reason?
- A . DNSSEC does not provide protection against Denial of Service (DoS) attacks
- B . DNSSEC does not guarantee authenticity of a DNS response during an attack
- C . DNSSEC does not protect the integrity of a DNS response
- D . DNSSEC does not guarantee the non-existence of a domain name or type
Ross performs security test on his company’s network assets and creates a detailed report of all the findings. In his report, he clearly explains the methodological approach that he has followed in finding the loopholes in the network.
However, his report does not mention about the security gaps that can be exploited or the amount of damage that may result from the successful exploitation of the loopholes. The report does not even mention about the remediation steps that are to be taken to secure the network.
What is the type of test that Ross has performed?
- A . Penetration testing
- B . Vulnerability assessment
- C . Risk assessment
- D . Security audit
JUA Networking Solutions is a group of certified ethical hacking professionals with a large client base. Stanley works as a penetrating tester at this firm. Future group approached JUA for an internal pen test. Stanley performs various penetration testing test sequences and gains information about the network resources and shares, routing tables, audit and service settings, SNMP and DNS details, machine names, users and groups, applications and banners. Identify the technique that gave Stanley this information.
- A . Enumeration
- B . Sniffing
- C . Ping sweeps
- D . Port scanning