ECCouncil ECSS - EC-Council Certified Security Specialist Exam

Question #6 (Topic: Topic 1)
Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.
A. Routers are responsible for making decisions about which of several paths network (orInternet)traffic will follow. B. Routers do not limit physical broadcast traffic. C. Routers organize addresses into classes, which are used to determine how to move packets fromone network to another. D. Routers act as protocol translators and bind dissimilar networks.
Answer: A,C,D
Question #7 (Topic: Topic 1)
Which of the following types of attacks cannot be prevented by technical measures only?
A. Brute force B. Ping flood attack C. Smurf DoS D. Social engineering
Answer: D
Question #8 (Topic: Topic 1)
You work as a Network Administrator for Tech Perfect Inc. The company requires a secure
wireless
network. To provide security, you are configuring ISA Server 2006 as a firewall. While
configuring
ISA Server 2006, which of the following is NOT necessary?
A. Defining how ISA Server would cache Web contents B. Defining ISA Server network configuration C. Setting up of monitoring on ISA Server D. Configuration of VPN access
Answer: D
Question #9 (Topic: Topic 1)
Which of the following attacks CANNOT be detected by an Intrusion Detection System
(IDS)?
Each correct answer represents a complete solution. Choose all that apply.
A. Denial-of-Service (DoS) attack B. E-mail spoofing C. Port scan attack D. Shoulder surfing
Answer: B,D
Question #10 (Topic: Topic 1)
Which of the following statements best describes a certification authority?
A. A certification authority is a type of encryption that uses a public key and a private key pair fordata encryption. B. A certification authority is an entity that issues digital certificates for use by other parties. C. A certification authority is a technique to authenticate digital documents by using computercryptography. D. A certification authority is a type of encryption that uses a single key to encrypt and decryp t data.
Answer: B
Download Exam
Page: 2 / 68
Total 337 questions