EC-COUNCIL EC-Council Certified Security Analyst (ECSA) 認定 ECSAv8 試験問題:
1. Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?
A) Post-Assessment Phase
B) Pre-Assessment Phase
C) Assessment Phase
D) Threat-Assessment Phase
2. Vulnerability assessment is an examination of the ability of a system or application, including the current security procedures and controls, to withstand assault.
What does a vulnerability assessment identify?
A) Weaknesses that could be exploited
B) Physical security breaches
C) Organizational structure
D) Disgruntled employees
3. A penetration test consists of three phases: pre-attack phase, attack phase, and postattack phase.
Active reconnaissance which includes activities such as network mapping, web profiling, and perimeter mapping is a part which phase(s)?
A) Pre-attack phase and attack phase
B) Post-attack phase
C) Attack phase
D) Pre-attack phase
4. This is a group of people hired to give details of the vulnerabilities present in the system found after a penetration test. They are elite and extremely competent penetration testers and intrusion analysts. This team prepares a report on the vulnerabilities in the system, attack methods, and how to defend against them.
What is this team called?
A) Gorilla team
B) Blue team
C) Lion team
D) Tiger team
5. When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
A) Passive IDS
B) NIPS
C) Progressive IDS
D) Active IDS
質問と回答:
質問 # 1 正解: B | 質問 # 2 正解: A | 質問 # 3 正解: D | 質問 # 4 正解: D | 質問 # 5 正解: D |