[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil ECSS Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 151 – (Topic 2)

Mark works as a Network Security Administrator for Umbrella Inc. The company has a Windows domain-based network. To provide security to the network, Mark plans to configure IDS. He wants to ensure that attackers are not able to modify or delete the

system files. To determine such attacks, the IDS must be able to monitor the file structure of the system. Which of the following intrusion detection technologies can be used to accomplish the task?

  1. Network IDS

  2. Log File Monitor (LFM)

  3. Host-based IDS

  4. Systems Integrity Verifier (SIV)

Answer: D

Question No: 152 – (Topic 2)

Which two security components should you implement on the sales personnel portable computers to increase security?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. Encrypting File System (EFS)

  2. L2TP over IPSec

  3. PPTP

  4. Remote access policy

  5. Remote Authentication Dial-In User Service (RADIUS)

Answer: A,B

Question No: 153 – (Topic 2)

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections.

According to the company#39;s security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company#39;s security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

  1. Configure the authentication type for the wireless LAN to Open system.

  2. Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

  3. On each client computer, add the SSID for the wireless LAN as the preferred network.

  4. Install a firewall software on each wireless access point.

  5. Broadcast SSID to connect to the access point (AP).

  6. Configure the authentication type for the wireless LAN to Shared Key.

Answer: B,C,F

Question No: 154 – (Topic 2)

You work as a Security Administrator for DataSoft Inc. The company has a Windows-based network. You have been assigned a project to strengthen the system security and also to provide a user friendly environment to the employees so that they can work efficiently.

Which of the following concepts should you take into consideration to meet the goals of your project?

  1. The security, functionality, and accessibility triangle.

  2. The security, complexity, and accessibility triangle

  3. The security, complexity, and functionality triangle

  4. The security, functionality, and ease of use triangle.

Answer: D

Question No: 155 – (Topic 2)

You enter the following URL on your Web browser:

http://www.we-are-secure.com/scripts/..%co../..%co% af../windows/system32/cmd.exe?/c dir c:\

What kind of attack are you performing?

  1. Session hijacking

  2. Directory traversal

  3. URL obfuscating

  4. Replay

Answer: B

Question No: 156 – (Topic 2)

Which of the following tools automates the password guessing in NetBIOS sessions and can also be used to perform a manual dictionary attack?

  1. KerbCrack

  2. Legion

  3. THC Hydra

  4. Pwdump

Answer: B

Question No: 157 – (Topic 2)

RRD Job World wants to upgrade its network. The company decides to implement a TCP/IP-based network. According to the case study, RRD Job World is concerned about security. Which of the following methods should the on-site employees use to communicate securely with the headquarters?

(Click the Exhibit button on the toolbar to see the case study.)

  1. Windows NT Challenge/Response (NTLM) authentication

  2. L2TP over IPSec

  3. Basic (Clear Text) authentication using SSL

  4. DNS security and group policies

Answer: C

Question No: 158 – (Topic 2)

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

  1. Change the entire security policy.

  2. Switch to a new network infrastructure.

  3. Start the Incident handling process.

  4. Perform an IT audit.

Answer: D

Question No: 159 – (Topic 2)

A chkrootkit is a toolkit that checks whether a rootkit is installed in the Linux operating system or not. Which of the following tools are contained in chkrootkit?

  1. chkproc.c

  2. chklastlog.c

  3. chkdsk

  4. ifpromisc.c

  5. chkwtmp.c

Answer: A,B,D,E

Question No: 160 – (Topic 2)

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

  1. Initial analysis, request for service, data collection, data reporting, data analysis

  2. Request for service, initial analysis, data collection, data reporting, data analysis

  3. Request for service, initial analysis, data collection, data analysis, data reporting

  4. Initial analysis, request for service, data collection, data analysis, data reporting

Answer: C

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No