EC-Council ECSAV8 Exam Questions
EC-Council Certified Security Analyst (ECSA) (Page 4 )

Updated On: 21-Feb-2026

Amazon, an IT based company, conducts a survey on the usage of the Internet. They found that company employees spend most of the time at work surfing the web for their personal use and for inappropriate web site viewing.

Management decide to block all such web sites using URL filtering software.

How can employees continue to see the blocked websites?

  1. Using session hijacking
  2. Using proxy servers
  3. Using authentication
  4. Using encryption

Answer(s): B



Nessus can test a server or a network for DoS vulnerabilities. Which one of the following script tries to kill a service?

  1. ACT_DENIAL
  2. ACT_FLOOD
  3. ACT_KILL_HOST
  4. ACT_ATTACK

Answer(s): A



Traffic on which port is unusual for both the TCP and UDP ports?

  1. Port 81
  2. Port 443
  3. Port 0
  4. Port21

Answer(s): C



Which type of security policy applies to the below configuration?

i) Provides maximum security while allowing known, but necessary, dangers
ii) All services are blocked; nothing is allowed
iii) Safe and necessary services are enabled individually
iv) Non-essential services and procedures that cannot be made safe are NOT allowed
v)Everything is logged

  1. Paranoid Policy
  2. Prudent Policy
  3. Permissive Policy
  4. Promiscuous Policy

Answer(s): B



Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?

  1. SYN Scan
  2. TCP Connect Scan
  3. XMAS Scan
  4. Null Scan

Answer(s): A






Post your Comments and Discuss EC-Council ECSAV8 exam dumps with other Community members:

Join the ECSAV8 Discussion