Traffic on which port is unusual for both the TCP and UDP ports?
Answer(s): C
Which type of security policy applies to the below configuration? i) Provides maximum security while allowing known, but necessary, dangers ii) All services are blocked; nothing is allowediii) Safe and necessary services are enabled individuallyiv) Non-essential services and procedures that cannot be made safe are NOT allowedv)Everything is logged
Answer(s): B
Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?
Answer(s): A
Snort, an open source network-based intrusion detection sensor, is the most widely installed NIDS in the world. It can be configured to run in the four modes. Which one of the following modes reads the packets off the network and displays them in a continuous stream on the console (screen)?
Post your Comments and Discuss EC-Council ECSAV8 exam prep with other Community members:
We’re offering these study questions to support your success. The least you can do? Drop a useful comment about each question. Help others. Build the community.