Archive

Category: EC-Council

  • 312-39 Certified SOC Analyst (CSA) Exam

    Exam Information The CSA exam (312-39) is available at the ECC Exam Centre. CSA Exam DetailsDuration 3 HoursQuestions 100 Clause: Age Requirements and Policies Concerning MinorsThe age requirement for attending the training or the exam is restricted to any candidate that is permitted by his/her country of origin/residency. If the candidate is under the legal […]?

  • 312-85 Certified Threat Intelligence Analyst Exam

    What is CTIA?Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat […]?

  • ECSAv8 EC-Council Certified Security Analyst (ECSA) Exam

    You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code. Is that enough?Can you become […]?

  • 312-50v11 Certified Ethical Hacker v11 Exam

    Certified Ethical Hacker (CEH) Version 11CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen […]?

  • 312-50v8: Certified Ethical Hacker v8

    QUESTION 1 Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks? A. Configure Port Security on the switch B. Configure Port Recon on the switch C. Configure Switch Mapping D. Configure Multiple Recognition on the switch Answer: A Explanation: QUESTION 2 Jimmy, an attacker, knows that he […]?

Archives