Free ECSAV8 Exam Braindumps (page: 25)

Page 24 of 51

Vulnerability assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels.

A vulnerability assessment is used to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.


Which of the following vulnerability assessment technique is used to test the web server infrastructure for any misconfiguration and outdated content?

  1. Passive Assessment
  2. Host-based Assessment
  3. External Assessment
  4. Application Assessment

Answer(s): D



Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following protocols does not use the TCP?

  1. Reverse Address Resolution Protocol (RARP)
  2. HTTP (Hypertext Transfer Protocol)
  3. SMTP (Simple Mail Transfer Protocol)
  4. Telnet

Answer(s): A



What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques
  2. SYN Scanning Techniques
  3. Stealth Scanning Techniques
  4. Port Scanning Techniques

Answer(s): C


Reference:

http://wwww.pc-freak.net/tutorials/hacking_info/arkin%20network%20scanning%20techniques.pdf (page 7



Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers. Which one of the following cannot handle routing protocols properly?

  1. “Internet-router-firewall-net architecture”
  2. “Internet-firewall-router-net architecture”
  3. “Internet-firewall/router(edge device)-net architecture”
  4. “Internet-firewall -net architecture”

Answer(s): B






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts