Latest Certified Success Dumps Download

ECSAv8 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testking ECCouncil ECSAv8 Dumps with VCE and PDF 121-130

September 26, 2017

2017 Sep ECCouncil Official New Released ECSAv8
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 121

Wireshark is a network analyzer. It reads packets from the network, decodes them, and presents them in an easy-to-understand format. Which one of the following is the command-line version of Wireshark, which can be used to capture the live packets from the wire or to read the saved capture files?

  1. Tcpdump

  2. Capinfos

  3. Tshark

  4. Idl2wrs

Answer: B

Question No: 122

Which of the following attacks is an offline attack?

  1. Pre-Computed Hashes

  2. Hash Injection Attack

  3. Password Guessing

  4. Dumpster Diving

Answer: A


Question No: 123

Which one of the following components of standard Solaris Syslog is a UNIX command that is used to add single-line entries to the system log?

  1. “Logger”

  2. “/etc/syslog.conf”

  3. “Syslogd”

  4. “Syslogd.conf”

Answer: A

Question No: 124

External penetration testing is a traditional approach to penetration testing and is more focused on the servers, infrastructure and the underlying software comprising the target. It involves a comprehensive analysis of publicly available information about the target, such as Web servers, Mail servers, Firewalls, and Routers.

Ensurepass 2017 PDF and VCE

Which of the following types of penetration testing is performed with no prior knowledge of the site?

  1. Blue box testing

  2. White box testing

  3. Grey box testing

  4. Black box testing

Answer: D

Reference:;pg=SA5-PA4amp;lpg=SA5- PA4amp;dq=penetration testing is performed with no prior knowledge of the siteamp;sourc e=blamp;ots=8GkmyUBH2Uamp;sig=wdBIboWxrhk5QjlQXs3yWOcuk2Qamp;hl=enamp;sa=Xamp;ei=- SgfVI2LLc3qaOa5gIgOamp;ved=0CCkQ6AEwAQ#v=onepageamp;q=penetration testing i s performed with no prior knowledge of the siteamp;f=false

Question No: 125

Which one of the following is false about Wireshark? (Select all that apply)

  1. Wireshark offers some options to analyze the WEP-decrypted data

  2. It does not support decrypting the TKIP or CCMP packets

  3. In order for Wireshark to decrypt the contents of the WEP-encrypted packets, it must be given the appropriate WEP key for the network

  4. Packet Sniffer Mode

Answer: A

Question No: 126

Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?

A. 3001-3100

B. 5000-5099

C. 6666-6674

D. 0 – 1023

Answer: D

Reference: (well known port numbers, 4th para)

Question No: 127

From where can clues about the underlying application environment can be collected?

  1. From the extension of the file

  2. From executable file

  3. From file types and directories

  4. From source code

Answer: A

Question No: 128

Besides the policy implications of chat rooms, Internet Relay Chat (IRC) is frequented by attackers and used as a command and control mechanism. IRC normally uses which one

of the following TCP ports?

  1. 6566 TCP port

  2. 6771 TCP port

  3. 6667 TCP port

  4. 6257 TCP port

Answer: C

Question No: 129

What is the difference between penetration testing and vulnerability testing?

Ensurepass 2017 PDF and VCE

  1. Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’

  2. Penetration testing is based on purely online vulnerability analysis while vulnerability testing engages ethical hackers to find vulnerabilities

  3. Vulnerability testing is more expensive than penetration testing

  4. Penetration testing is conducted purely for meeting compliance standards while vulnerability testing is focused on online scans

Answer: A

Question No: 130

Which of the following is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?


  2. Netsec

  3. IKE

  4. IPsec

Answer: D

Reference: 0/ip_security/provisioning/guide/IPsecPG1.html

100% Free Download!
Download Free Demo:ECSAv8 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass ECSAv8 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE