Free ECSAV8 Exam Braindumps (page: 26)

Page 25 of 51

This is a group of people hired to give details of the vulnerabilities present in the system found after a penetration test. They are elite and extremely competent penetration testers and intrusion analysts. This team prepares a report on the vulnerabilities in the system, attack methods, and how to defend against them.


What is this team called?

  1. Blue team
  2. Tiger team
  3. Gorilla team
  4. Lion team

Answer(s): B



John, a penetration tester from a pen test firm, was asked to collect information about the host file in a Windows system directory. Which of the following is the location of the host file in Window system directory?

  1. C:\Windows\System32\Boot
  2. C:\WINNT\system32\drivers\etc
  3. C:\WINDOWS\system32\cmd.exe
  4. C:\Windows\System32\restore

Answer(s): B


Reference:

http://en.wikipedia.org/wiki/Hosts_(file) (location in the file system, see the table)



One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured. By default, the Nessus daemon listens to connections on which one of the following?

  1. Localhost (127.0.0.1) and port 1241
  2. Localhost (127.0.0.1) and port 1240
  3. Localhost (127.0.0.1) and port 1246
  4. Localhost (127.0.0.0) and port 1243

Answer(s): A



Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.

  1. Unannounced Testing
  2. Double Blind Testing
  3. Announced Testing
  4. Blind Testing

Answer(s): B






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts