Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free ECSA quiz to give your IT career a boost! :
Step 1 of 10
Which technique will not be defend against ARP spoofing?
B. Routes packets between the networks
Manages public access to private networked resources
D. Filters only inbound traffic but not outbound traffic
C. Examines all traffic routed between the two networks to see if it meets certain criteria
Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?
0 – 1023
Which of the following is the objective of Gramm-Leach Bliley Act?
To ease the transfer of financial information between institutions and banks
To certify the accuracy of the reported financial statement
To set a new or enhanced standards for all U.S. public company boards, management and public accounting firms
To protect the confidentiality, integrity, and availability of data
Which of the following statements is true about the LM hash?
Disabled in Windows Vista and 7 OSs
Letters are converted to the lowercase
Paddedwith NULL to 16 characters
Separated into two 8-character strings
Which of the following will not handle routing protocols properly?
“Internet-firewall/router(edge device)-net architecture”
“Internet-firewall -net architecture”
What is the maximum value of a "tinyint" field in most database systems?
240 or less
225 or more
224 or more
Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?
Which of the following is not the SQL injection attack character?
Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?
User Identification and Password Policy
Personal Computer Acceptable Use Policy