EC-Council Certified Security Specialist v6.0 (ECSS)

Page:    1 / 23   
Total 337 questions

Jason, a cybercriminal, sells illegal articles on the Internet. Which of the following activities is Jason involved in?

  • A. Cyberstalking
  • B. Cyberterrorism
  • C. Cybertrespass
  • D. Internet pharmacies


Answer : D

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  • A. Bandwidth
  • B. Delay
  • C. Load
  • D. Frequency


Answer : D

A firewall is a combination of hardware and software, used to provide security to a network.
It is used to protect an internal network or intranet against unauthorized access from the
Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  • A. Stunnel
  • B. IPTables
  • C. OpenSSH
  • D. IPChains


Answer : B

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

  • A. Hardening
  • B. Sanitization
  • C. Authentication
  • D. Cryptography


Answer : A

Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.
The __________ command is used to remove the print jobs that have been queued for printing by using a secure connection.

  • A. lprm -E


Answer : A

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

  • A. Snort 2.1.0
  • B. WIDS
  • C. NFR security
  • D. LogIDS 1.0


Answer : B

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

  • A. RSA
  • B. Twofish
  • C. Blowfish
  • D. Diffie-Hellman


Answer : D

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses
'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Zero-day attack
  • B. Social engineering
  • C. Rainbow attack
  • D. Buffer-overflow attack
  • E. Brute force attack
  • F. Dictionary-based attack
  • G. Denial-of-service (DoS) attack
  • H. Password guessing


Answer : B,C,E,F,G,H

Which of the following software helps in protecting the computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software?
Each correct answer represents a complete solution. Choose all that apply.

  • A. BitDefender
  • B. Windows Defender
  • C. John the Ripper
  • D. THC Hydra


Answer : A,B

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures?
Each correct answer represents a complete solution. Choose all that apply.

  • A. In order to digitally sign an electronic record, a person must use his/her public key.
  • B. In order to verify a digital signature, the signer's private key must be used.
  • C. In order to verify a digital signature, the signer's public key must be used.
  • D. In order to digitally sign an electronic record, a person must use his/her private key.


Answer : C,D

Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows- based environment. The company's employees use Microsoft Outlook Express as their e- mail client program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.

  • A. FINALeMAIL
  • B. eMailTrackerPro
  • C. EventCombMT
  • D. R-mail


Answer : A,D

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

  • A. Eradication phase
  • B. Preparation phase
  • C. Recovery phase
  • D. Identification phase
  • E. Containment phase


Answer : B

Each correct answer represents a complete solution. Choose two.

  • A. Modem
  • B. Console
  • C. Sensor
  • D. Gateway
  • E. Firewall


Answer : B,C

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

  • A. Production honeypot
  • B. Research honeypot
  • C. Honeynet
  • D. Honeyfarm


Answer : A

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows
Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales network for the laptops.
The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user.
You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
  • B. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.
  • C. Implement the open system authentication for the wireless network.
  • D. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.
  • E. Implement the IEEE 802.1X authentication for the wireless network.


Answer : A,D,E

Page:    1 / 23   
Total 337 questions