Free ECSAV8 Exam Braindumps (page: 9)

Page 8 of 51

Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network?

  1. Information-Protection Policy
  2. Paranoid Policy
  3. Promiscuous Policy
  4. Prudent Policy

Answer(s): B



War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks. Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

  1. Airsnort
  2. Aircrack
  3. WEPCrack
  4. Airpwn

Answer(s): A



NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network. Which one of the following ports is used by NTP as its transport layer?

  1. TCP port 152
  2. UDP port 177
  3. UDP port 123
  4. TCP port 113

Answer(s): C



From where can clues about the underlying application environment can be collected?

  1. From the extension of the file
  2. From executable file
  3. From file types and directories
  4. From source code

Answer(s): A






Post your Comments and Discuss EC-Council ECSAV8 exam with other Community members:

ECSAV8 Discussions & Posts