Free ECSAV8 Exam Braindumps (page: 3)

Page 2 of 51

Which of the following documents helps in creating a confidential relationship between the pen tester and client to protect critical and confidential information or trade secrets?

  1. Penetration Testing Agreement
  2. Rules of Behavior Agreement
  3. Liability Insurance
  4. Non-Disclosure Agreement

Answer(s): D



Why is a legal agreement important to have before launching a penetration test?

  1. Guarantees your consultant fees
  2. Allows you to perform a penetration test without the knowledge and consent of the organization's upper management
  3. It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.
  4. It is important to ensure that the target organization has implemented mandatory security policies

Answer(s): C



A security policy is a document or set of documents that describes, at a high level, the security controls that will be implemented by the company. Which one of the following policies forbids everything and restricts usage of company computers, whether it is system usage or network usage?

  1. Paranoid Policy
  2. Prudent Policy
  3. Promiscuous Policy
  4. Information-Protection Policy

Answer(s): A



Which of the following protocol’s traffic is captured by using the filter tcp.port==3389 in the Wireshark tool?

  1. Reverse Gossip Transport Protocol (RGTP)
  2. Real-time Transport Protocol (RTP)
  3. Remote Desktop Protocol (RDP)
  4. Session Initiation Protocol (SIP)

Answer(s): C


Reference:

http://wiki.wireshark.org/RDP






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts