EC COUNCIL ECSAv10
Q: 1
Which of the following is not a characteristic of a firewall?
Options
Q: 2
A framework is a fundamental structure used to support and resolve complex issues. The framework
that delivers an efficient set of technologies in order to develop applications which are more secure
in using Internet and Intranet is:
Options
Q: 3
A framework for security analysis is composed of a set of instructions, assumptions, and limitations
to analyze and solve security concerns and develop threat free applications.
Which of the following frameworks helps an organization in the evaluation of the company’s
information security with that of the industrial standards?
Options
Q: 4
Which of the following policies helps secure data and protects the privacy of organizational
information?
Options
Q: 5
In the TCP/IP model, the transport layer is responsible for reliability and flow control from source to
the destination. TCP provides the mechanism for flow control by allowing the sending and receiving
hosts to communicate.
A flow control mechanism avoids the problem with a transmitting host overflowing the buffers in the
receiving host.


Options
Q: 6
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following
command. What is he testing at this point?
include
#include
int main(int argc, char *argv[])
{
char buffer[10];
if (argc < 2)
{
fprintf(stderr, "USAGE: %s string\n", argv[0]);
return 1;
}
strcpy(buffer, argv[1]);
return 0;
}
Options
Q: 7
ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol
(ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC
address with the IP address of another host (such as the default gateway), causing any traffic meant
for that IP address to be sent to the attacker instead.
ARP spoofing attack is used as an opening for other attacks.
What type of attack would you launch after successfully deploying ARP spoofing?
What type of attack would you launch after successfully deploying ARP spoofing?Options
Q: 8
Which one of the following log analysis tools is used for analyzing the server’s log files?
Options
Q: 9
DMZ is a network designed to give the public access to the specific internal resources and you might
want to do the same thing for guests visiting organizations without compromising the integrity of the
internal resources. In general, attacks on the wireless networks fall into four basic categories.
Identify the attacks that fall under Passive attacks category.
Options
Q: 10
What is the difference between penetration testing and vulnerability testing?


Options
Question 1 of 10