Free ECSAV8 Exam Braindumps (page: 5)

Page 4 of 51

Traffic on which port is unusual for both the TCP and UDP ports?

  1. Port 81
  2. Port 443
  3. Port 0
  4. Port21

Answer(s): C



Which type of security policy applies to the below configuration?

i) Provides maximum security while allowing known, but necessary, dangers
ii) All services are blocked; nothing is allowed
iii) Safe and necessary services are enabled individually
iv) Non-essential services and procedures that cannot be made safe are NOT allowed
v)Everything is logged

  1. Paranoid Policy
  2. Prudent Policy
  3. Permissive Policy
  4. Promiscuous Policy

Answer(s): B



Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?

  1. SYN Scan
  2. TCP Connect Scan
  3. XMAS Scan
  4. Null Scan

Answer(s): A



Snort, an open source network-based intrusion detection sensor, is the most widely installed NIDS in the world. It can be configured to run in the four modes. Which one of the following modes reads the packets off the network and displays them in a continuous stream on the console (screen)?

  1. Packet Sniffer Mode
  2. Packet Logger Mode
  3. Network Intrusion Detection System Mode
  4. Inline Mode

Answer(s): A






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts