Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

ECSAv10 Exam Dumps - ECCouncil ECSA Questions and Answers

Page: 1 / 7
Questions 4

George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs.

The state bill requires that an IDS with a "time-based induction machine" be used. What IDS feature must George implement to meet this requirement?

Options:

A.

Pattern matching

B.

Statistical-based anomaly detection

C.

Real-time anomaly detection

D.

Signature-based anomaly detection

Buy Now
Questions 5

War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks.

Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

Options:

A.

Airsnort

B.

Aircrack

C.

WEPCrack

D.

Airpwn

Buy Now
Questions 6

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

http://172.168.4.131/level/99/exec/show/config

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

Options:

A.

URL Obfuscation Arbitrary Administrative Access Vulnerability

B.

Cisco IOS Arbitrary Administrative Access Online Vulnerability

C.

HTTP Configuration Arbitrary Administrative Access Vulnerability

D.

HTML Configuration Arbitrary Administrative Access Vulnerability

Buy Now
Questions 7

Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?

Options:

A.

UDP and TCP

B.

TCP and SMTP

C.

SMTP

D.

UDP and SMTP

Buy Now
Page: 1 / 7
Exam Code: ECSAv10
Exam Name: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing
Last Update: Nov 21, 2024
Questions: 201
ECSAv10 pdf

ECSAv10 PDF

$28  $80
ECSAv10 Engine

ECSAv10 Testing Engine

$33.25  $95
ECSAv10 PDF + Engine

ECSAv10 PDF + Testing Engine

$45.5  $130