Free ECSAv10 Exam Dumps

Question 26

Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network?

Correct Answer:B

Question 27

One of the steps in information gathering is to run searches on a company using complex keywords in Google.
ECSAv10 dumps exhibit
Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?

Correct Answer:C

Question 28

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

Correct Answer:B

Question 29

Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

Correct Answer:A

Question 30

What is kept in the following directory? HKLMSECURITYPolicySecrets

Correct Answer:A