Free ECSAV8 Exam Braindumps (page: 18)

Page 17 of 51

A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped.


Why is an appliance-based firewall is more secure than those implemented on top of the commercial operating system (Software based)?

  1. Appliance based firewalls cannot be upgraded
  2. Firewalls implemented on a hardware firewall are highly scalable
  3. Hardware appliances does not suffer from security vulnerabilities associated with the underlying operating system
  4. Operating system firewalls are highly configured

Answer(s): C



Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs. One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named “Access Point Detection”. This plug-in uses four techniques to identify the presence of a WAP. Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?

  1. NMAP TCP/IP fingerprinting
  2. HTTP fingerprinting
  3. FTP fingerprinting
  4. SNMP fingerprinting

Answer(s): C



In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

  1. IPS evasion technique
  2. IDS evasion technique
  3. UDP evasion technique
  4. TTL evasion technique

Answer(s): D


Reference:

http://is.muni.cz/th/172999/fi_m/MT_Bukac.pdf (page 24)



In the TCP/IP model, the transport layer is responsible for reliability and flow control from source to the destination. TCP provides the mechanism for flow control by allowing the sending and receiving hosts to communicate. A flow control mechanism avoids the problem with a transmitting host overflowing the buffers in the receiving host.

Which of the following flow control mechanism guarantees reliable delivery of data?

  1. Sliding Windows
  2. Windowing
  3. Positive Acknowledgment with Retransmission (PAR)
  4. Synchronization

Answer(s): C


Reference:

http://condor.depaul.edu/jkristof/technotes/tcp.html (1.1.3 Reliability)






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts