ECSAv10 Dumps

ECSAv10 Free Practice Test

EC-Council ECSAv10: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

QUESTION 21

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

Correct Answer: A

QUESTION 22

War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks.
Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

Correct Answer: A

QUESTION 23

The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.
ECSAv10 dumps exhibit
What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

Correct Answer: D

QUESTION 24

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate.
He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.
Which firewall would be most appropriate for Harold?

Correct Answer: A

QUESTION 25

External penetration testing is a traditional approach to penetration testing and is more focused on the servers, infrastructure and the underlying software comprising the target. It involves a comprehensive analysis of publicly available information about the target, such as Web servers, Mail servers, Firewalls, and Routers.
ECSAv10 dumps exhibit
Which of the following types of penetration testing is performed with no prior knowledge of the site?

Correct Answer: D