최신 412-79v8 무료덤프 - EC-COUNCIL EC-Council Certified Security Analyst (ECSA)
Which one of the following is a supporting tool for 802.11 (wireless) packet injections, it spoofs
802.11 packets to verify whether the access point is valid or not?
802.11 packets to verify whether the access point is valid or not?
정답: A
Identify the type of firewall represented in the diagram below:
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Packet filtering firewalls are usually a part of a router. In a packet filtering firewall, each packet is compared to a set of criteria before it is forwarded.
Depending on the packet and the criteria, the firewall can: i)Drop the packet ii)Forward it or send a message to the originator
At which level of the OSI model do the packet filtering firewalls work?
Depending on the packet and the criteria, the firewall can: i)Drop the packet ii)Forward it or send a message to the originator
At which level of the OSI model do the packet filtering firewalls work?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
In the context of penetration testing, what does blue teaming mean?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?
정답: C
Which of the following acts is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards and applies to all entities involved in payment card processing?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Identify the framework that comprises of five levels to guide agency assessment of their security programs and assist in prioritizing efforts for improvement:
정답: B
The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems.
Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?
Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?
정답: B
Which of the following is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)