00:00

QUESTION 31

From where can clues about the underlying application environment can be collected?

Correct Answer: D

QUESTION 32

DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories.
Identify the attacks that fall under Passive attacks category.

Correct Answer: A

QUESTION 33

Today, most organizations would agree that their most valuable IT assets reside within applications and databases. Most would probably also agree that these are areas that have the weakest levels of security, thus making them the prime target for malicious activity from system administrators, DBAs, contractors, consultants, partners, and customers.
ECSAv10 dumps exhibit
Which of the following flaws refers to an application using poorly written encryption code to securely encrypt and store sensitive data in the database and allows an attacker to steal or modify weakly protected data such as credit card numbers, SSNs, and other authentication credentials?

Correct Answer: B

QUESTION 34

The Internet is a giant database where people store some of their most private information on the cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS attacks, website defacement, lost computers, accidental publishing, and more have all been sources of major leaks over the last 15 years.
ECSAv10 dumps exhibit
What is the biggest source of data leaks in organizations today?

Correct Answer: C

QUESTION 35

In which of the following firewalls are the incoming or outgoing packets blocked from accessing services for which there is no proxy?

Correct Answer: D