최신 412-79 무료덤프 - EC-COUNCIL EC-Council Certified Security Analyst (ECSA)
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
정답: D
Assessing a network from a hacker's point of view to discover the exploits and vulnerabilities that are accessible to the outside world is which sort of vulnerability assessment?
정답: D
Port numbers are used to keep track of different conversations crossing the network at the same time. Both TCP and UDP use port (socket) numbers to pass information to the upper layers. Port numbers have the assigned ranges. The port numbers above 1024 are considered as which one of the following? (Select all that apply)
정답: D
John, a penetration tester, was asked for a document that defines the project, specifies goals, objectives, deadlines, the resources required, and the approach of the project. Which of the following includes all of these requirements?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?
정답: D
Identify the type of authentication mechanism represented below:


정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is an ARP cache poisoning technique aimed at network switches?
정답: A
Which of the following acts related to information security in the US establish that the management of an organization is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting?
정답: B
Amazon, an IT based company, conducts a survey on the usage of the Internet. They found that company employees spend most of the time at work surfing the web for their personal use and for inappropriate web site viewing. Management decide to block all such web sites using URL filtering software.

How can employees continue to see the blocked websites?

How can employees continue to see the blocked websites?
정답: D
Which of the following is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?
정답: C