Free ECSAv10 Exam Dumps

Question 21

The Internet is a giant database where people store some of their most private information on the cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS attacks, website defacement, lost computers, accidental publishing, and more have all been sources of major leaks over the last 15 years.
ECSAv10 dumps exhibit
What is the biggest source of data leaks in organizations today?

Correct Answer:C

Question 22

Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

Correct Answer:B

Question 23

The objective of social engineering pen testing is to test the strength of human factors in a security chain within the organization. It is often used to raise the level of security awareness among employees.
ECSAv10 dumps exhibit
The tester should demonstrate extreme care and professionalism during a social engineering pen test as it might involve legal issues such as violation of privacy and may result in an embarrassing situation for the organization.
Which of the following methods of attempting social engineering is associated with bribing, handing out gifts, and becoming involved in a personal relationship to befriend someone inside the company?

Correct Answer:A

Question 24

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?
ECSAv10 dumps exhibit

Correct Answer:A

Question 25

Which of the following is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?

Correct Answer:D