EC-COUNCIL EC-Council Certified Security Analyst (ECSA) 認定 ECSAv8 試験問題:
1. A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped.
Why is an appliance-based firewall is more secure than those implemented on top of the commercial operating system (Software based)?
A) Operating system firewalls are highly configured
B) Firewalls implemented on a hardware firewall are highly scalable
C) Appliance based firewalls cannot be upgraded
D) Hardware appliances does not suffer from security vulnerabilities associated with the underlying operating system
2. Which of the following is not a characteristic of a firewall?
A) Routes packets between the networks
B) Manages public access to private networked resources
C) Examines all traffic routed between the two networks to see if it meets certain criteria
D) Filters only inbound traffic but not outbound traffic
3. What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?
A) Stealth Scanning Techniques
B) SYN Scanning Techniques
C) Connect Scanning Techniques
D) Port Scanning Techniques
4. From where can clues about the underlying application environment can be collected?
A) From file types and directories
B) From executable file
C) From the extension of the file
D) From source code
5. Which of the following acts is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards and applies to all entities involved in payment card processing?
A) Data Protection Act 1998
B) Human Rights Act 1998
C) PCI DSS
D) PIPEDA
質問と回答:
質問 # 1 正解: D | 質問 # 2 正解: A | 質問 # 3 正解: A | 質問 # 4 正解: D | 質問 # 5 正解: C |