[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil ECSS Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 111 – (Topic 2)

On March 6, 2003, The SCO Group asserted that there are legal uncertainties regarding the use of the Linux operating system due to alleged violations of IBM#39;s Unix licenses in the development of Linux code at IBM. What were the claims made by SCO on IBM regarding the use of the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

  1. Interference with contract

  2. Breach of the GNU General Public License (GPL)

  3. Lanham Act violation

  4. Misappropriation of trade secrets

  5. Breach of IBM software agreement

Answer: A,D,E

Question No: 112 – (Topic 2)

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

  1. Gateway

  2. LMHOSTS

  3. Firewall

  4. Bastion host

Answer: D

Question No: 113 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We- are-secure server.

The output of the scanning test is as follows:

C.\whisker.pl -h target_IP_address

– whisker / v1.4.0 / rain forest puppy / www.wiretrip.net – = – = – = – = – =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability (#39;Printenv#39; vulnerability) in the We_are_secure server. Which of the following statements about #39;Printenv#39; vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

  1. This vulnerability helps in a cross site scripting attack.

  2. #39;Printenv#39; vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

  3. With the help of #39;printenv#39; vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

  4. The countermeasure to #39;printenv#39; vulnerability is to remove the CGI script.

Answer: A,C,D

Question No: 114 – (Topic 2)

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers.

Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

  1. Microsoft Internet Security amp; Acceleration Server (ISA)

  2. Wingate

  3. SOCKS

  4. Sniffer

Answer: B

Question No: 115 – (Topic 2)

Which of the following are the types of DOS commands?

Each correct answer represents a complete solution. Choose all that apply.

  1. Direct commands

  2. Internal commands

  3. Active commands

  4. External commands

Answer: B,D

Question No: 116 – (Topic 2)

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

  1. Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

  2. Send an email to the domain administrator responsible for the initiating IP address.

  3. Close existing email account and open new email account.

  4. Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

Answer: A,D

Question No: 117 – (Topic 2)

You work as a computer operator for BlueWells Inc. The company has a Windows-based network.

You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about?

  1. Spyware

  2. Keylogger

  3. Anti-Virus

  4. Adware

Answer: B

Question No: 118 – (Topic 2)

You have been assigned the job of configuring wireless networks for a large company. The security of these networks is of great importance. One of the tools that you can use for applying security is Wireless Transport Layer Security (WTLS). What are the goals of using this tool?

Each correct answer represents a complete solution. Choose all that apply.

  1. To provide authentication between the two end points

  2. To provide data integrity

  3. To provide privacy for the two end users

  4. To provide data availability

Answer: A,B,C

Question No: 119 – (Topic 2)

You work as a system administrator for BlueSkwer.com. You have just finished installing and configuring a new laptop for the CEO. The laptop has Windows 7 operating system. You have just deployed a secure wireless network in the company. Alex, the CEO, wants you to connect his laptop to the wireless network. What will you open to start the process of connecting to a wireless network?

  1. Network and Sharing Center

  2. Appearance and Personalization

  3. System and Security

  4. Devices and Printers

Answer: A

Question No: 120 – (Topic 2)

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:

  • Sniff data frames on a local area network.

  • Modify the network traffic.

  • Stop the network traffic frequently.

    Which of the following techniques will the attacker use to accomplish the task?

    1. ARP spoofing

    2. IP spoofing

    3. Eavesdropping

    4. Session hijacking

    Answer: A

    100% Ensurepass Free Download!
    Download Free Demo:ECSS Demo PDF
    100% Ensurepass Free Guaranteed!
    ECSS Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No