[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil ECSS Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 121 – (Topic 2)

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

  1. Snort

  2. NetStumbler

  3. AiroPeek

  4. Cain

Answer: B

Question No: 122 – (Topic 2)

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

  1. Anti-x

  2. Image hide

  3. Stegbreak

  4. Snow.exe

Answer: B,D

Question No: 123 – (Topic 2)

Which of the following statements are true about firewalking?

Each correct answer represents a complete solution. Choose all that apply.

  1. Firewalking works on the UDP packets.

  2. A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.

  3. To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.

  4. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.

Answer: B,C,D

Question No: 124 – (Topic 2)

You are using the dsniff tool to intercept communications between two entities and

establish credentials with both sides of the connections. These entities do not notice that you were retrieving the information between these two. Which of the following attacks are you performing?

  1. Session hijacking

  2. DoS

  3. ARP poisoning

  4. Man-in-the-middle

Answer: D

Question No: 125 – (Topic 2)

Which of the following tools will you use to prevent from session hijacking? Each correct answer represents a complete solution. Choose all that apply.

  1. OpenSSH

  2. Telnet

  3. Rlogin

  4. SSL

Answer: A,D

Question No: 126 – (Topic 2)

Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

  1. The Equal Credit Opportunity Act (ECOA)

  2. The Privacy Act

  3. The Fair Credit Reporting Act (FCRA)

  4. The Electronic Communications Privacy Act

Answer: A

Question No: 127 – (Topic 2)

Net Spy Pro is the latest network monitoring software. This program helps a user to know what the others are doing on their computers. What are the features of this program?

Each correct answer represents a complete solution. Choose all that apply.

  1. PC administration

  2. Remote control

  3. Activity filtering

  4. Activity monitoring

Answer: A,B,C,D

Question No: 128 – (Topic 2)

Which of the following commands is used to make traceroute wait 5 seconds for a response to a packet?

  1. traceroute -r

  2. traceroute -w

  3. traceroute -q

  4. traceroute -T

Answer: B

Question No: 129 – (Topic 2)

Which of the following is a form of cheating or copying someone else#39;s work or idea without acknowledging the source?

  1. Plagiarism

  2. Turnitin

  3. Copyright

  4. Patent

Answer: A

Question No: 130 – (Topic 2)

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

  1. By launching Social Engineering attack

  2. By launching Sequence attack

  3. Route table poisoning

  4. By launching Max Age attack

Answer: B,C,D

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No