Certbus > EC-COUNCIL > EC-COUNCIL Certifications > ECSS > ECSS Online Practice Questions and Answers

ECSS Online Practice Questions and Answers

Questions 4

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

A. Routers are responsible for making decisions about which of several paths network (orInternet)traffic will follow.

B. Routers do not limit physical broadcast traffic.

C. Routers organize addresses into classes, which are used to determine how to move packets fromone network to another.

D. Routers act as protocol translators and bind dissimilar networks.

Browse 337 Q&As
Questions 5

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

A. Using WEP encryption

B. Using WPA encryption

C. Not broadcasting SSID

D. MAC filtering the router

Browse 337 Q&As
Questions 6

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A. Snooping

B. Copyright

C. Utility model

D. Patent

Browse 337 Q&As
Questions 7

Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.

Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?

Each correct answer represents a complete solution. Choose two.

A. rwho -a

B. lastb

C. last

D. pwd

Browse 337 Q&As
Questions 8

Which of the following softwares is used to perform constant monitoring of the network infrastructure?

A. Logdog

B. THCHydra

C. IPSentry

D. Cain

Browse 337 Q&As
Questions 9

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

A. Firewalking

B. Snooping

C. Port redirection

D. UDP port scanning

Browse 337 Q&As
Questions 10

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.

The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

A. Jason did not perform a vulnerability assessment.

B. Jason did not perform port scanning.

C. Jason did not perform covering tracks.

D. Jason did not perform foot printing.

E. Jason did not perform OS fingerprinting.

Browse 337 Q&As
Questions 11

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

A. Stunnel

B. IPChains

C. IPTables

D. OpenSSH

Browse 337 Q&As
Questions 12

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

· Network diagrams of the we-are-secure infrastructure · Source code of the security tools · IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

A. Graybox

B. Blackbox

C. Alpha testing

D. Whitebox

Browse 337 Q&As
Questions 13

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

A. Anti-x

B. Image hide

C. Stegbreak

D. Snow.exe

Browse 337 Q&As
Questions 14

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

A. By launching Social Engineering attack

B. By launching Sequence++ attack

C. Route table poisoning

D. By launching Max Age attack

Browse 337 Q&As
Questions 15

Maria works as a Security Administrator for NetPerfect Inc. The company has a Windows-based network. Maria wants to ensure that the Sales executives of the company are able to surf the Internet only through a secure URL. Which of the following protocols provides a secure connection to the Internet?

A. FTP

B. HTTPS

C. HTTP

D. WAP

Browse 337 Q&As
Questions 16

Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice?

Each correct answer represents a part of the solution. Choose all that apply.

A. Call

B. Look

C. Identify

D. Stop

Browse 337 Q&As
Questions 17

Burp Suite is a Java application for attacking web applications. This tool includes a proxy server, a spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?

A. Repeater

B. Spider

C. Intruder

D. Proxy Server

Browse 337 Q&As
Questions 18

You work as a computer operator for BlueWells Inc. The company has a Windows-based network.

You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about?

A. Spyware

B. Keylogger

C. Anti-Virus

D. Adware

Browse 337 Q&As
Exam Code: ECSS
Exam Name: EC-Council Certified Security Specialist (ECSS) v10
Last Update: Mar 18, 2025
Questions: 337 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99