[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil ECSS Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 51 – (Topic 1)

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux- based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on

27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.

Which of the following worms has attacked the computer?

  1. Code red

  2. Ramen

  3. LoveLetter

  4. Nimda

Answer: B

Question No: 52 – (Topic 1)

Which two technologies should research groups use for secure VPN access while traveling?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. SSL

  2. Kerberos authentication

  3. PPTP

  4. Smart cards

  5. Encrypting File System (EFS)

Answer: C,D

Question No: 53 – (Topic 1)

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

  1. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

  2. Attacker can use the Ping Flood DoS attack if WZC is used.

  3. Attacker by creating a fake wireless network with high power antenna cause Victor#39;s computer to associate with his network to gain access.

  4. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Answer: A,C

Question No: 54 – (Topic 1)

Which of the following uses public key cryptography to encrypt the contents of files?

  1. EFS

  2. DFS

  3. NTFS

  4. RFS

Answer: A

Question No: 55 – (Topic 1)

Which of the following softwares is used to perform constant monitoring of the network infrastructure?

  1. Logdog

  2. THCHydra

  3. IPSentry

  4. Cain

Answer: C

Question No: 56 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at

a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Implement the open system authentication for the wireless network.

  2. Implement the IEEE 802.1X authentication for the wireless network.

  3. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

  4. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

  5. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

Answer: B,C,D

Question No: 57 – (Topic 1)

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

  1. TCP session hijacking is when a hacker takes over a TCP session between two machines.

  2. It is used to slow the working of victim#39;s network resources.

  3. Use of a long random number or string as the session key reduces session hijacking.

  4. It is the exploitation of a valid computer session to gain unauthorized access to informationor services in a computer system.

Answer: A,C,D

Question No: 58 – (Topic 1)

Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?

Each correct answer represents a complete solution. Choose all that apply.

  1. Phalanx2

  2. Adore

  3. Knark

  4. Beastkit

Answer: B,C

Question No: 59 – (Topic 1)

Who among the following are security experts who specialize in penetration testing and other testing methodologies to ensure that their company#39;s information systems are secure?

Each correct answer represents a complete solution. Choose all that apply.

  1. Black hat hackers

  2. White hat hackers

  3. Script Kiddies

  4. Ethical hackers

Answer: B,D

Question No: 60 – (Topic 1)

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.

John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

  1. Independent audit

  2. Operational audit

  3. Non-operational audit

  4. Dependent audit

Answer: A

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No