Discount Offer
Go Back on ECSAv10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

ECSAv10 Practice Test

Whether you're a beginner or brushing up on skills, our ECSAv10 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 3 out of 41 Pages

Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and
it works well for direct scanning and often works well through firewalls?


A.

SYN Scan


B.

Connect() scan


C.

XMAS Scan


D.

Null Scan





A.
  

SYN Scan



Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of
any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the
information has been acquired by an unauthorized person?


A.

California SB 1386


B.

Sarbanes-Oxley 2002


C.

Gramm-Leach-Bliley Act (GLBA)


D.

USA Patriot Act 2001





A.
  

California SB 1386



DMZ is a network designed to give the public access to the specific internal resources and you might want to do the
same thing for guests visiting organizations without compromising the integrity of the internal resources. In general,
attacks on the wireless networks fall into four basic categories.
Identify the attacks that fall under Passive attacks category.


A.

Wardriving


B.

Spoofing


C.

Sniffing


D.

Network Hijacking





A.
  

Wardriving



Which of the following attacks does a hacker perform in order to obtain UDDI information such as businessEntity,
businesService, bindingTemplate, and tModel?


A.

Web Services Footprinting Attack


B.

Service Level Configuration Attacks


C.

URL Tampering Attacks


D.

Inside Attacks





A.
  

Web Services Footprinting Attack



Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and
creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?


A.

Threat-Assessment Phase


B.

Pre-Assessment Phase


C.

Assessment Phase


D.

Post-Assessment Phase





B.
  

Pre-Assessment Phase



Explanation
QUESTION
Answer: NO: 87
What are the security risks of running a "repair" installation for Windows XP?
A. There are no security risks when running the "repair" installation for Windows XP
B. Pressing Shift+F1 gives the user administrative rights
C. Pressing Ctrl+F10 gives the user administrative rights
D. Pressing Shift+F10 gives the user administrative rights
Answer: D


Page 3 out of 41 Pages
Previous