Free ECSAV8 Exam Braindumps (page: 16)

Page 15 of 51

A Demilitarized Zone (DMZ) is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. Usage of a protocol within a DMZ environment is highly variable based on the specific needs of an organization. Privilege escalation, system is compromised when the code runs under root credentials, and DoS attacks are the basic weakness of which one of the following Protocol?

  1. Lightweight Directory Access Protocol (LDAP)
  2. Simple Network Management Protocol (SNMP)
  3. Telnet
  4. Secure Shell (SSH)

Answer(s): D



Which of the following will not handle routing protocols properly?

  1. “Internet-router-firewall-net architecture”
  2. “Internet-firewall-router-net architecture”
  3. “Internet-firewall -net architecture”
  4. “Internet-firewall/router(edge device)-net architecture”

Answer(s): B



A framework for security analysis is composed of a set of instructions, assumptions, and limitations to analyze and solve security concerns and develop threat free applications.
Which of the following frameworks helps an organization in the evaluation of the company’s information security with that of the industrial standards?

  1. Microsoft Internet Security Framework
  2. Information System Security Assessment Framework
  3. The IBM Security Framework
  4. Nortell’s Unified Security Framework

Answer(s): B



Which of the following reports provides a summary of the complete pen testing process, its outcomes, and recommendations?

  1. Vulnerability Report
  2. Executive Report
  3. Client-side test Report
  4. Host Report

Answer(s): B






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts