[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil ECSS Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 71 – (Topic 1)

Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows- based environment. The company#39;s employees use Microsoft Outlook Express as their e- mail client program. E-mails of some employees have been deleted due to a virus attack on the network.

Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

  1. FINALeMAIL

  2. eMailTrackerPro

  3. EventCombMT

  4. R-mail

Answer: A,D

Question No: 72 – (Topic 1)

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

  1. Eradication phase

  2. Preparation phase

  3. Recovery phase

  4. Identification phase

  5. Containment phase

Answer: B

Question No: 73 – (Topic 1)

Which of the following components are usually found in an Intrusion detection system (IDS)

?

Each correct answer represents a complete solution. Choose two.

  1. Modem

  2. Console

  3. Sensor

  4. Gateway

  5. Firewall

Answer: B,C

Question No: 74 – (Topic 1)

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

  1. Production honeypot

  2. Research honeypot

  3. Honeynet

  4. Honeyfarm

Answer: A

Question No: 75 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user.

You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you take to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

  2. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

  3. Implement the open system authentication for the wireless network.

  4. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

  5. Implement the IEEE 802.1X authentication for the wireless network.

Answer: A,D,E

Question No: 76 – (Topic 1)

Which of the following statements are TRUE about Demilitarized zone (DMZ)? Each correct answer represents a complete solution. Choose all that apply.

  1. The purpose of a DMZ is to add an additional layer of security to the Local Area Network of an organization.

  2. In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.

  3. Hosts in the DMZ have full connectivity to specific hosts in the internal network.

  4. Demilitarized zone is a physical or logical sub-network that contains and exposes

external services of an organization to a larger un-trusted network.

Answer: A,B,D

Question No: 77 – (Topic 1)

In which of the following complaint types does a fraudulent transaction take place?

  1. Overpayment Fraud

  2. FBI scams

  3. Auction fraud

  4. Computer damage

Answer: C

Question No: 78 – (Topic 1)

Which of the following malicious software is used by several advertising websites for downloading and displaying advertisements in the Web browser without user permission?

  1. Worm

  2. Blended threat

  3. Adware

  4. Trojan horse

Answer: C

Question No: 79 – (Topic 1)

Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Call

  2. Look

  3. Identify

  4. Stop

Answer: A,B,D

Question No: 80 – (Topic 1)

Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

  1. LILO

  2. GRUB

  3. NT Loader

  4. BootX

Answer: D

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No