ECCouncil Related Exams
412-79v10 Exam

Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs.
One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named “Access Point Detection”. This plug-in uses four techniques to identify the presence of a WAP.
Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?
Which of the following is NOT related to the Internal Security Assessment penetration testing strategy?
What is the maximum value of a “tinyint” field in most database systems?