Pass the ECCouncil ECSA ECSAv10 Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Traffic on which port is unusual for both the TCP and UDP ports?

Options:

A.

Port 81


B.

Port 443


C.

Port 0


D.

Port 21


Expert Solution
Questions # 32:

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.

How would you answer?

Options:

A.

IBM Methodology


B.

LPT Methodology


C.

Google Methodology


D.

Microsoft Methodology


Expert Solution
Questions # 33:

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

Options:

A.

%systemroot%\LSA


B.

%systemroot%\repair


C.

%systemroot%\system32\drivers\etc


D.

%systemroot%\system32\LSA


Expert Solution
Questions # 34:

Which of the following statement holds true for TCP Operation?

Question # 34

Options:

A.

Port numbers are used to know which application the receiving host should pass the data to


B.

Sequence numbers are used to track the number of packets lost in transmission


C.

Flow control shows the trend of a transmitting host overflowing the buffers in the receiving host


D.

Data transfer begins even before the connection is established


Expert Solution
Questions # 35:

Which of the following external pen testing tests reveals information on price, usernames and passwords, sessions, URL characters, special instructors, encryption used, and web page behaviors?

Question # 35

Options:

A.

Check for Directory Consistency and Page Naming Syntax of the Web Pages


B.

Examine Server Side Includes (SSI)


C.

Examine Hidden Fields


D.

Examine E-commerce and Payment Gateways Handled by the Web Server


Expert Solution
Questions # 36:

What are the 6 core concepts in IT security?

Question # 36

Options:

A.

Server management, website domains, firewalls, IDS, IPS, and auditing


B.

Authentication, authorization, confidentiality, integrity, availability, and non-repudiation


C.

Passwords, logins, access controls, restricted domains, configurations, and tunnels


D.

Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans


Expert Solution
Questions # 37:

Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?

Options:

A.

Draft


B.

Report


C.

Requirement list


D.

Quotation


Expert Solution
Questions # 38:

Which of the following statements is true about the LM hash?

Options:

A.

Disabled in Windows Vista and 7 OSs


B.

Separated into two 8-character strings


C.

Letters are converted to the lowercase


D.

Padded with NULL to 16 characters


Expert Solution
Questions # 39:

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.

Which firewall would be most appropriate for Harold?

Options:

A.

Application-level proxy firewall


B.

Data link layer firewall


C.

Packet filtering firewall


D.

Circuit-level proxy firewall


Expert Solution
Questions # 40:

Metasploit framework in an open source platform for vulnerability research, development, and penetration testing. Which one of the following metasploit options is used to exploit multiple systems at once?

Options:

A.

NinjaDontKill


B.

NinjaHost


C.

RandomNops


D.

EnablePython


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions