최신 412-79v8 무료덤프 - EC-COUNCIL EC-Council Certified Security Analyst (ECSA)
Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?
정답: C
Which of the following documents helps in creating a confidential relationship between the pen tester and client to protect critical and confidential information or trade secrets?
정답: C
Which of the following is not the SQL injection attack character?
정답: A
Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?
정답: D
A security policy is a document or set of documents that describes, at a high level, the security controls that will be implemented by the company. Which one of the following policies forbids everything and restricts usage of company computers, whether it is system usage or network usage?
정답: B
External penetration testing is a traditional approach to penetration testing and is more focused on the servers, infrastructure and the underlying software comprising the target. It involves a comprehensive analysis of publicly available information about the target, such as Web servers, Mail servers, Firewalls, and Routers.
Which of the following types of penetration testing is performed with no prior knowledge of the site?
Which of the following types of penetration testing is performed with no prior knowledge of the site?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. It sends a sequence of three Internet Control Message Protocol (ICMP) echo request packets addressed to a destination host.
The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination.
During routing, each router reduces packets' TTL value by
The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination.
During routing, each router reduces packets' TTL value by
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following attacks is an offline attack?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
By default, the TFTP server listens on UDP port 69. Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote computer and is used to troubleshoot TCP/IP connectivity issues?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following acts is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards and applies to all entities involved in payment card processing?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)