최신 ECSA ECSAv8 무료샘플문제:
1. John, the penetration testing manager in a pen testing firm, needs to prepare a pen testing pricing report for a client.
Which of the following factors does he need to consider while preparing the pen testing pricing report?
A) Complete structure of the organization
B) Number of servers available in the client organization
C) Number of employees in the client organization
D) Number of client computers to be tested and resources required to perform a pen test
2. The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a
malicious manner to gain access to the target systems.
Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?
A) Active Information Gathering
B) Pseudonymous Information Gathering
C) Open Source or Passive Information Gathering
D) Anonymous Information Gathering
3. What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?
A) Server Sort Includes
B) Sort Server Includes
C) Server Side Includes
D) Slide Server Includes
4. Which of the following policies helps secure data and protects the privacy of organizational information?
A) Cryptography Policy
B) Personal Security Policy
C) Document retention Policy
D) Special-Access Policy
5. An external intrusion test and analysis identify security weaknesses and strengths of the client's systems and networks as they appear from outside the client's security perimeter, usually from the Internet. The goal of an external intrusion test and analysis is to demonstrate the existence of known vulnerabilities that could be exploited by an external attacker.
During external penetration testing, which of the following scanning techniques allow you to determine a port's state without making a full connection to the host?
A) SYN scan
B) NULL Scan
C) FIN Scan
D) XMAS Scan
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: A | 질문 # 3 정답: C | 질문 # 4 정답: A | 질문 # 5 정답: A |