Free ECSAv10 Exam Braindumps (page: 4)

Page 4 of 52

Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

  1. California SB 1386
  2. Sarbanes-Oxley 2002
  3. Gramm-Leach-Bliley Act (GLBA)
  4. USA Patriot Act 2001

Answer(s): A



DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories. Identify the attacks that fall under Passive attacks category.

  1. Wardriving
  2. Spoofing
  3. Sniffing
  4. Network Hijacking

Answer(s): A



Which of the following attacks does a hacker perform in order to obtain UDDI information such as businessEntity, businesService, bindingTemplate, and tModel?

  1. Web Services Footprinting Attack
  2. Service Level Configuration Attacks
  3. URL Tampering Attacks
  4. Inside Attacks

Answer(s): A



Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?

  1. Threat-Assessment Phase
  2. Pre-Assessment Phase
  3. Assessment Phase
  4. Post-Assessment Phase

Answer(s): B



Page 4 of 52



Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

Calisto MF Moniz commented on October 12, 2024
No comment for this form for the time being.
Anonymous
upvote

Calisto MF Moniz commented on October 12, 2024
Good mechanism for Security expertise practices!
Anonymous
upvote

Raymond commented on July 06, 2021
This is my second purchase. I passed first exam already.
MEXICO
upvote