EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 789  
   
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company‘s network. How would you answer?


 
A:    Microsoft Methodology
 
B:    Google Methodology
C:    IBM Methodology
 
D:    LPT Methodology
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 21/05/2025
Opted Answer: D
ECSA (EC-Council Certified Security Analyst) exam for LPT (Master) certification.

LPT (Licensed Penetration Tester) Methodology is an advanced industry-standard penetration testing framework such as PTES, NIST 800-115, PCI DSS, ISSAF, and OSSTMM, incorporating best practices for network security assessments, used by cybersecurity professionals.

Key Features of LPT Methodology:
Multi-Level Pivoting – Navigating through network layers to exploit vulnerabilities.

Privilege Escalation – Gaining higher access levels within a system.

OS Vulnerability Exploitation – Identifying and exploiting weaknesses in operating systems.

SQL Injection & Web Exploits – Testing web applications for security flaws.

SSH Tunneling & Proxy Chains – Bypassing security restrictions for deeper penetration testing.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations