[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil ECSS Dumps with VCE and PDF 101-110

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 101 – (Topic 2)

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

  1. E-mail Spam

  2. E-mail spoofing

  3. E-mail bombing

  4. E-mail Storm

Answer: A

Question No: 102 – (Topic 2)

You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network.

You receive an e-mail from the network administrator#39;s e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Buffer-overflow attack

  2. Social engineering

  3. Zero-day attack

  4. E-mail spoofing

Answer: B,D

Question No: 103 – (Topic 2)

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?

  1. Malware

  2. External threat

  3. Internal threat

  4. Zombie

Answer: C

Question No: 104 – (Topic 2)

You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure. Which of the following tools can you use to accomplish the task?

  1. Wget

  2. WinSSLMiM

  3. Whisker

  4. httprint

Answer: D

Question No: 105 – (Topic 2)

You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.

You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file named file2 rather than being displayed on the screen.

Which of the following tools should you use to accomplish the task?

  1. My_program 2gt;gt; file2

  2. My_program gt;gt; file2

  3. My_program 2gt; file2

  4. My_program gt; file2

Answer: C

Question No: 106 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre- attack phases while testing the security of the server:

  • Footprinting

  • Scanning

    Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

    Each correct answer represents a complete solution. Choose all that apply.

    1. PsFile

    2. UserInfo

    3. PsPasswd

    4. WinSSLMiM

    Answer: A,B,C

    Question No: 107 – (Topic 2)

    You work as a Network Administrator for Infonet Inc. The company#39;s network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network.

    Where will you place the Web server?

    1. In a virtual private network (VPN)

    2. With the authentication server

    3. In a demilitarized zone (DMZ)

    4. With the database server

    Answer: C

    Question No: 108 – (Topic 2)

    Which of the following tools is used to catch someone installing a rootkit or running a packet sniffer?

    1. chkrootkit

    2. rkhunter

    3. Blue Pill

    4. OSSEC

    Answer: A

    Question No: 109 – (Topic 2)

    You work as a Network Administrator for Maverick Inc. The company has a Linux-based network.

    You are working on a Linux computer. You want to see the environment variables that are set on your computer. Which of the following commands will you use?

    1. ls

    2. echo $shell

    3. rm

    4. env

    Answer: D

    Question No: 110 – (Topic 2)

    Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

    1. The secret key can encrypt a message, and anyone with the public key can decrypt it.

    2. Data encrypted with the secret key can only be decrypted by another secret key.

    3. The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

    4. Data encrypted by the public key can only be decrypted by the secret key.

    Answer: A,D

    100% Ensurepass Free Download!
    Download Free Demo:ECSS Demo PDF
    100% Ensurepass Free Guaranteed!
    ECSS Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No