Free ECSAV8 Exam Braindumps (page: 11)

Page 10 of 51

HTTP protocol specifies that arbitrary binary characters can be passed within the URL by using %xx notation, where 'xx' is the

  1. ASCII value of the character
  2. Binary value of the character
  3. Decimal value of the character
  4. Hex value of the character

Answer(s): D


Reference:

https://books.google.nl/books?id=0RfANAwOUdIC&pg=PA720&lpg=PA720&dq=%22xx+notation%22+binary&source=bl&ots=pGMqass7ti&sig=rnIg1xZ78ScUvuIlTmDY3r7REuc&hl=nl&sa=X&ei=8C4dVYe1NorgasrzgoAL&ved=0CEQQ6AEwBQ#v=onepage&q=%22xx%20n otation%22%20binary&f=false



Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

  1. California SB 1386
  2. Sarbanes-Oxley 2002
  3. Gramm-Leach-Bliley Act (GLBA)
  4. USA Patriot Act 2001

Answer(s): A



Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?

  1. Wireshark: Capinfos
  2. Wireshark: Tcpdump
  3. Wireshark: Text2pcap
  4. Wireshark: Dumpcap

Answer(s): D



Which of the following password cracking techniques is used when the attacker has some information about the password?

  1. Hybrid Attack
  2. Dictionary Attack
  3. Syllable Attack
  4. Rule-based Attack

Answer(s): D


Reference:

http://202.154.59.182/mfile/files/Information%20System/Computer%20Forensics%3B%20Hard%20Disk%20and%20Operating%20Systems/CHAPTER%207%20Application%20Pass word%20Crackers.pdf (page 4, rule-based attack)






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts