Free ECSAV8 Exam Braindumps (page: 22)

Page 21 of 51

Port numbers are used to keep track of different conversations crossing the network at the same time. Both TCP and UDP use port (socket) numbers to pass information to the upper layers. Port numbers have the assigned ranges.

Port numbers above 1024 are considered which one of the following?

  1. Dynamically assigned port numbers
  2. Statically assigned port numbers
  3. Well-known port numbers
  4. Unregistered port numbers

Answer(s): A


Reference:

http://stackoverflow.com/questions/136709/what-port-number-should-i-use-when-testing-connections-in-my- local-intranet-in (see post 4)



One of the steps in information gathering is to run searches on a company using complex keywords in Google.

Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?

  1. ROCHESTON fileformat:+ppt
  2. ROCHESTON ppt:filestring
  3. ROCHESTON filetype:ppt
  4. ROCHESTON +ppt:filesearch

Answer(s): C


Reference:

http://blog.hubspot.com/blog/tabid/6307/bid/1264/12-Quick-Tips-To-Search-Google-Like-An-Expert.aspx (specific document types)



Which among the following information is not furnished by the Rules of Engagement (ROE) document?

  1. Techniques for data collection from systems upon termination of the test
  2. Techniques for data exclusion from systems upon termination of the test
  3. Details on how data should be transmitted during and after the test
  4. Details on how organizational data is treated throughout and after the test

Answer(s): A



A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator whenever a rogue access point is detected.

Conventionally it is achieved by comparing the MAC address of the participating wireless devices.
Which of the following attacks can be detected with the help of wireless intrusion detection system (WIDS)?

  1. Social engineering
  2. SQL injection
  3. Parameter tampering
  4. Man-in-the-middle attack

Answer(s): D


Reference:

http://www.infosecwriters.com/text_resources/pdf/Wireless_IDS_JDixon.pdf (page 5)






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts