Free ECSAV8 Exam Braindumps (page: 12)

Page 11 of 51

Which of the following policies helps secure data and protects the privacy of organizational information?

  1. Special-Access Policy
  2. Document retention Policy
  3. Cryptography Policy
  4. Personal Security Policy

Answer(s): C



You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using Idp.exe. What are you trying to accomplish here?

  1. Poison the DNS records with false records
  2. Enumerate MX and A records from DNS
  3. Establish a remote connection to the Domain Controller
  4. Enumerate domain user accounts and built-in groups

Answer(s): D



An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases. Which of the following attacks is this?

  1. Frame Injection Attack
  2. LDAP Injection Attack
  3. XPath Injection Attack
  4. SOAP Injection Attack

Answer(s): D


Reference:

http://luizfirmino.blogspot.com/2011_09_01_archive.html



To locate the firewall, SYN packet is crafted using Hping or any other packet crafter and sent to the firewall. If ICMP unreachable type 13 message (which is an admin prohibited packet) with a source IP address of the access control device is received, then it means which of the following type of firewall is in place?

  1. Circuit level gateway
  2. Stateful multilayer inspection firewall
  3. Packet filter
  4. Application level gateway

Answer(s): C






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts