Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free ECSA quiz to give your IT career a boost! :
Step 1 of 10
Which of the following will not handle routing protocols properly?
“Internet-firewall/router(edge device)-net architecture”
“Internet-firewall -net architecture”
Which technique will not be defend against ARP spoofing?
C. Examines all traffic routed between the two networks to see if it meets certain criteria
D. Filters only inbound traffic but not outbound traffic
Manages public access to private networked resources
B. Routes packets between the networks
Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?
Personal Computer Acceptable Use Policy
User Identification and Password Policy
Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?
0 – 1023
Which of the following is not the SQL injection attack character?
Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?
What is the maximum value of a "tinyint" field in most database systems?
225 or more
224 or more
240 or less
Which of the following statements is true about the LM hash?
Letters are converted to the lowercase
Disabled in Windows Vista and 7 OSs
Separated into two 8-character strings
Paddedwith NULL to 16 characters
Which of the following is the objective of Gramm-Leach Bliley Act?
To protect the confidentiality, integrity, and availability of data
To set a new or enhanced standards for all U.S. public company boards, management and public accounting firms
To ease the transfer of financial information between institutions and banks
To certify the accuracy of the reported financial statement