00:00

QUESTION 51

Information gathering is performed to:
i) Collect basic information about the target company and its network
ii) Determine the operating system used, platforms running, web server versions, etc.
iii) Find vulnerabilities and exploits
ECSAv10 dumps exhibit
Which of the following pen testing tests yields information about a company’s technology infrastructure?

Correct Answer: D

QUESTION 52

A Demilitarized Zone (DMZ) is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. Usage of a protocol within a DMZ environment is highly variable based on the specific needs of an organization.
Privilege escalation, system is compromised when the code runs under root credentials, and DoS attacks are the basic weakness of which one of the following Protocol?

Correct Answer: D

QUESTION 53

External penetration testing is a traditional approach to penetration testing and is more focused on the servers, infrastructure and the underlying software comprising the target. It involves a comprehensive analysis of publicly available information about the target, such as Web servers, Mail servers, Firewalls, and Routers.
ECSAv10 dumps exhibit
Which of the following types of penetration testing is performed with no prior knowledge of the site?

Correct Answer: D

QUESTION 54

John, the penetration testing manager in a pen testing firm, needs to prepare a pen testing pricing report for a client. Which of the following factors does he need to consider while preparing the pen testing pricing report?
ECSAv10 dumps exhibit

Correct Answer: C