PrepAway - Latest Free Exam Questions & Answers

Category: 412-79v8

Exam 412-79v8: EC-Council Certified Security Analyst (ECSA) v8

Which of the following TCP flag combinations combines the problem of initiation, midstream, and termination fl

Due to illegal inputs, various types of TCP stacks respond in a different manner. Some IDSs
do not take into account the TCP protocol’s urgency feature, which could allow testers to
evade the IDS.

Penetration tester needs to try different combinations of TCP flags (e.g. none, SYN/FIN,
SYN/RST, SYN/FIN/ACK, SYN/RST/ACK, and All Flags) to test the IDS.

Which of the following TCP flag combinations combines the problem of initiation, midstream,
and termination flags with the PSH and URG?

What is the biggest source of data leaks in organizations today?

The Internet is a giant database where people store some of their most private information
on the cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS
attacks, website defacement, lost computers, accidental publishing, and more have all been
sources of major leaks over the last 15 years.

What is the biggest source of data leaks in organizations today?


Page 8 of 15« First...678910...Last »