Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free ECSA quiz to give your IT career a boost! :
Step 1 of 10
What is the maximum value of a "tinyint" field in most database systems?
240 or less
224 or more
225 or more
Which of the following is the objective of Gramm-Leach Bliley Act?
To set a new or enhanced standards for all U.S. public company boards, management and public accounting firms
To certify the accuracy of the reported financial statement
To protect the confidentiality, integrity, and availability of data
To ease the transfer of financial information between institutions and banks
Which of the following will not handle routing protocols properly?
“Internet-firewall -net architecture”
“Internet-firewall/router(edge device)-net architecture”
Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?
Which technique will not be defend against ARP spoofing?
C. Examines all traffic routed between the two networks to see if it meets certain criteria
Manages public access to private networked resources
D. Filters only inbound traffic but not outbound traffic
B. Routes packets between the networks
Which of the following is not the SQL injection attack character?
Which of the following statements is true about the LM hash?
Separated into two 8-character strings
Disabled in Windows Vista and 7 OSs
Paddedwith NULL to 16 characters
Letters are converted to the lowercase
Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?
0 – 1023
Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?
User Identification and Password Policy
Personal Computer Acceptable Use Policy