ECSAv10 Dumps

ECSAv10 Free Practice Test

EC-Council ECSAv10: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

QUESTION 41

Output modules allow Snort to be much more flexible in the formatting and presentation of output to its users. Snort has 9 output plug-ins that push out data in different formats. Which one of the following output plug-ins allows alert data to be written in a format easily importable to a database?

Correct Answer: B

QUESTION 42

Which of the following methods is used to perform server discovery?

Correct Answer: B

QUESTION 43

Metasploit framework in an open source platform for vulnerability research, development, and penetration testing. Which one of the following metasploit options is used to exploit multiple systems at once?

Correct Answer: A

QUESTION 44

You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?

Correct Answer: C

QUESTION 45

An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases. Which of the following attacks is this?

Correct Answer: D