Ethical Hacking and Countermeasures
EC-Council Disaster Recovery Professional v3 (EDRP)
Linux Security
Certified Network Defender (CND)
Certified EC-Council Instructor (CEI)
EC-Council Certified Security Specialist (ECSSv10)Exam
Ethical Hacking and Countermeasures V8
EC-Council Certified CISO (CCISO)
Computer Hacking Forensic Investigator (v9)
EC-Council Information Security Manager (E|ISM)
What is a good security method to prevent unauthorized users from "tailgating"?
Electronic key systems
Man trap
Pick-resistant locks
Electronic combination locks
Which of the following is NOT related to the Internal Security Assessment penetration testing strategy?
Testing to provide a more complete view of site security
Testing focused on the servers, infrastructure, and the underlying software, including the target
Testing including tiers and DMZs within the environment, the corporate network, or partner company connections
Testing performed from a number of network access points representing each logical and physical segment
Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?
Decreases consumed employee time and increases system uptime
Increases detection and reaction time
Increases response time
Both Decreases consumed employee time and increases system uptime and Increases response time