PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 412-79v8

Exam 412-79v8: EC-Council Certified Security Analyst (ECSA) v8

Which of the following techniques do attackers use to create backdoors to covertly gather critical information

Attackers create secret accounts and gain illegal access to resources using backdoor while
bypassing the authentication procedures. Creating a backdoor is a where an attacker
obtains remote access to a computer on a network.

Which of the following techniques do attackers use to create backdoors to covertly gather
critical information about a target machine?

Which of the following factors is NOT considered while preparing the scope of the Rules of Engagment (ROE)?

Rule of Engagement (ROE) is the formal permission to conduct a pen-test. It provides toplevel guidance for conducting the penetration testing.
Various factors are considered while preparing the scope of ROE which clearly explain the
limits associated with the security test.

Which of the following factors is NOT considered while preparing the scope of the Rules of
Engagment (ROE)?


Page 5 of 15« First...34567...10...Last »