Download ECCouncil.ECSAv10.ActualTests.2019-08-27.68q.tqb

Download Exam

File Info

Exam EC-Council Certified Security Analyst
Number ECSAv10
File Name ECCouncil.ECSAv10.ActualTests.2019-08-27.68q.tqb
Size 1 MB
Posted Aug 27, 2019
Download ECCouncil.ECSAv10.ActualTests.2019-08-27.68q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Peter, a disgruntled ex-employee of Zapmaky Solutions Ltd., is trying to jeopardize the company’s website http://zapmaky.com. He conducted the port scan of the website by using the Nmap tool to extract the information about open ports and their corresponding services. While performing the scan, he recognized that some of his requests are being blocked by the firewall deployed by the IT personnel of Zapmaky and he wants to bypass the same. For evading the firewall, he wanted to employ the stealth scanning technique which is an incomplete TCP three-way handshake method that can effectively bypass the firewall rules and logging mechanisms. 
Which if the following Nmap commands should Peter execute to perform stealth scanning?


  1. nmap -sT -v zapmaky.com
  2. nmap -T4 -A -v zapmaky.com
  3. nmap -sX -T4 -A -v zapmaky.com
  4. nmap -sN -A zapmaky.com
Correct answer: A



Question 2

Richard, a penetration tester was asked to assess a web application. During the assessment, he discovered a file upload field where users can upload their profile pictures. While scanning the page for vulnerabilities, Richard found a file upload exploit on the website. Richard wants to test the web application by uploading a malicious PHP shell, but the web page denied the file upload. Trying to get around the security, Richard added the ‘jpg’ extension to the end of the file. The new file name ended with ‘.php.jpg’. He then used the Burp suite tool and removed the ‘jpg’’ extension from the request while uploading the file. This enabled him to successfully upload the PHP shell. 
Which of the following techniques has Richard implemented to upload the PHP shell?


  1. Session stealing
  2. Cookie tampering 
  3. Cross site scripting
  4. Parameter tampering
Correct answer: D



Question 3

An organization has deployed a web application that uses encoding technique before transmitting the data over the Internet. This encoding technique helps the organization to hide the confidential data such as user credentials, email attachments, etc. when in transit. This encoding technique takes 3 bytes of binary data and divides it into four chunks of 6 bits. Each chunk is further encoded into respective printable character. 
Identify the encoding technique employed by the organization?


  1. Unicode encoding
  2. Base64 encoding
  3. URL encoding
  4. HTMS encoding
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files