New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ECSAv10 Exam Dumps - EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing

Go to page:
Question # 17

DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories.

Identify the attacks that fall under Passive attacks category.

A.

Wardriving

B.

Spoofing

C.

Sniffing

D.

Network Hijacking

Full Access
Question # 18

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

A.

AES

B.

DES (ECB mode)

C.

MD5

D.

RC5

Full Access
Question # 19

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

A.

Service account passwords in plain text

B.

Cached password hashes for the past 20 users

C.

IAS account names and passwords

D.

Local store PKI Kerberos certificates

Full Access
Question # 20

Which of the following will not handle routing protocols properly?

A.

“Internet-router-firewall-net architecture”

B.

“Internet-firewall-router-net architecture”

C.

“Internet-firewall -net architecture”

D.

“Internet-firewall/router(edge device)-net architecture”

Full Access
Question # 21

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

A.

Smurf scan

B.

Tracert

C.

Ping trace

D.

ICMP ping sweep

Full Access
Question # 22

Identify the type of authentication mechanism represented below:

A.

NTLMv1

B.

NTLMv2

C.

LAN Manager Hash

D.

Kerberos

Full Access
Question # 23

Which of the following policies helps secure data and protects the privacy of organizational information?

A.

Special-Access Policy

B.

Document retention Policy

C.

Cryptography Policy

D.

Personal Security Policy

Full Access
Question # 24

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

A.

%systemroot%\LSA

B.

%systemroot%\repair

C.

%systemroot%\system32\drivers\etc

D.

%systemroot%\system32\LSA

Full Access
Go to page: