Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
ECSS Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testking ECCouncil ECSS Dumps with VCE and PDF 1-10

September 26, 2017

EnsurePass
2017 Sep ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 1 – (Topic 1)

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?

Each correct answer represents a complete solution. Choose all that apply.

  1. ICMP packets leaving the network should be allowed.

  2. An attacker should know the IP address of the last known gateway before the firewall.

  3. There should be a backdoor installed on the network.

  4. An attacker should know the IP address of a host located behind the firewall.

Answer: A,B,D

Question No: 2 – (Topic 1)

Which of the following security protocols are based on the 802.11i standard? Each correct answer represents a complete solution. Choose all that apply.

  1. WEP

  2. WPA2

  3. WPA

  4. WEP2

Answer: B,C

Question No: 3 – (Topic 1)

Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

  1. Transport layer

  2. Presentation layer

  3. Data-link layer

  4. Network layer

Answer: B

Question No: 4 – (Topic 1)

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

  1. Vulnerability scanning

  2. Manual penetration testing

  3. Automated penetration testing

  4. Code review

Answer: A

Question No: 5 – (Topic 1)

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

  1. Lead investigator

  2. Information security representative

  3. Technical representative

  4. Legal representative

Answer: C

Question No: 6 – (Topic 1)

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

  1. Routers are responsible for making decisions about which of several paths network (orInternet)traffic will follow.

  2. Routers do not limit physical broadcast traffic.

  3. Routers organize addresses into classes, which are used to determine how to move packets fromone network to another.

  4. Routers act as protocol translators and bind dissimilar networks.

Answer: A,C,D

Question No: 7 – (Topic 1)

Which of the following types of attacks cannot be prevented by technical measures only?

  1. Brute force

  2. Ping flood attack

  3. Smurf DoS

  4. Social engineering

Answer: D

Question No: 8 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless

network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring

ISA Server 2006, which of the following is NOT necessary?

  1. Defining how ISA Server would cache Web contents

  2. Defining ISA Server network configuration

  3. Setting up of monitoring on ISA Server

  4. Configuration of VPN access

Answer: D

Question No: 9 – (Topic 1)

Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?

Each correct answer represents a complete solution. Choose all that apply.

  1. Denial-of-Service (DoS) attack

  2. E-mail spoofing

  3. Port scan attack

  4. Shoulder surfing

Answer: B,D

Question No: 10 – (Topic 1)

Which of the following statements best describes a certification authority?

  1. A certification authority is a type of encryption that uses a public key and a private key pair fordata encryption.

  2. A certification authority is an entity that issues digital certificates for use by other parties.

  3. A certification authority is a technique to authenticate digital documents by using computercryptography.

  4. A certification authority is a type of encryption that uses a single key to encrypt and decryp t data.

Answer: B

100% Free Download!
Download Free Demo:ECSS Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass ECSS Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE