ECCouncil
412-79
232
EC-Council Certified Security Analyst v10
A: Techniques for data collection from systems upon termination of the test
B: Techniques for data exclusion from systems upon termination of the test
C: Details on how data should be transmitted during and after the test
D: Details on how organizational data is treated throughout and after the test
A: Wardriving
B: Spoofing
C: Sniffing
D: Network Hijacking
A: unified
B: csv
C: alert_unixsock
D: alert_fast