Free ECSAV8 Exam Braindumps (page: 23)

Page 22 of 51

What sort of vulnerability assessment approach starts by building an inventory of protocols found on the machine?

  1. Inference-based Assessment
  2. Service-based Assessment Solutions
  3. Product-based Assessment Solutions
  4. Tree-based Assessment

Answer(s): A


Reference:

http://www.businessweek.com/adsections/2005/pdf/wp_mva.pdf (page 26, first para on the page)



Identify the attack represented in the diagram below:

  1. Input Validation
  2. Session Hijacking
  3. SQL Injection
  4. Denial-of-Service

Answer(s): B


Reference:

http://en.wikipedia.org/wiki/Session_hijacking



Which of the following is NOT related to the Internal Security Assessment penetration testing strategy?

  1. Testing to provide a more complete view of site security
  2. Testing focused on the servers, infrastructure, and the underlying software, including the target
  3. Testing including tiers and DMZs within the environment, the corporate network, or partner company connections
  4. Testing performed from a number of network access points representing each logical and physical segment

Answer(s): B



TCP/IP model is a framework for the Internet Protocol suite of computer network protocols that defines the communication in an IP-based network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.


Which of the following TCP/IP layers selects the best path through the network for packets to travel?

  1. Transport layer
  2. Network Access layer
  3. Internet layer
  4. Application layer

Answer(s): C






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts