Traffic on which port is unusual for both the TCP and UDP ports?
Answer(s): C
Which type of security policy applies to the below configuration? i) Provides maximum security while allowing known, but necessary, dangers ii) All services are blocked; nothing is allowediii) Safe and necessary services are enabled individuallyiv) Non-essential services and procedures that cannot be made safe are NOT allowedv)Everything is logged
Answer(s): B
Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?
Answer(s): A
Snort, an open source network-based intrusion detection sensor, is the most widely installed NIDS in the world. It can be configured to run in the four modes. Which one of the following modes reads the packets off the network and displays them in a continuous stream on the console (screen)?
Post your Comments and Discuss EC-Council ECSAV8 exam prep with other Community members:
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ECSAV8 content, but please register or login to continue.
We’re offering these study questions to support your success. The least you can do? Drop a useful comment about each question. Help others. Build the community.