Free ECSAV8 Exam Braindumps (page: 17)

Page 16 of 51

Transmission control protocol accepts data from a data stream, divides it into chunks, and adds a TCP header creating a TCP segment.
The TCP header is the first 24 bytes of a TCP segment that contains the parameters and state of an end-to-end TCP socket. It is used to track the state of communication between two TCP endpoints.
For a connection to be established or initialized, the two hosts must synchronize. The synchronization requires each side to send its own initial sequence number and to receive a confirmation of exchange in an acknowledgment (ACK) from the other side.

The below diagram shows the TCP Header format:


How many bits is a acknowledgement number?

  1. 16 bits
  2. 32 bits
  3. 8 bits
  4. 24 bits

Answer(s): B


Reference:

http://en.wikipedia.org/wiki/Transmission_Control_Protocol (acknowledgement number)



Which one of the following commands is used to search one of more files for a specific pattern and it helps in organizing the firewall log files?

  1. grpck
  2. grep
  3. gpgv
  4. gprn

Answer(s): B



A penetration test consists of three phases: pre-attack phase, attack phase, and post-attack phase.

Active reconnaissance which includes activities such as network mapping, web profiling, and perimeter mapping is a part which phase(s)?

  1. Post-attack phase
  2. Pre-attack phase and attack phase
  3. Attack phase
  4. Pre-attack phase

Answer(s): D


Reference:

https://www.duo.uio.no/bitstream/handle/10852/34904/Shrestha-masterthesis.pdf?sequence=1 (page 28, first para)



Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?

  1. ip.dst==10.0.0.7
  2. ip.port==10.0.0.7
  3. ip.src==10.0.0.7
  4. ip.dstport==10.0.0.7

Answer(s): C






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts