Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
ECSS Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testking ECCouncil ECSS Dumps with VCE and PDF 201-210

September 26, 2017

EnsurePass
2017 Sep ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 201 – (Topic 3)

Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Call

  2. Look

  3. Stop

  4. Identify

Answer: A,B,C

Question No: 202 – (Topic 3)

Which of the following is a valid IP address for class B Networks?

A. 212.136.45.8

B. 172.157.88.3

C. 80.33.5.7

D. 225.128.98.7

Answer: B

Question No: 203 – (Topic 3)

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

  1. Digital certificates

  2. Twofish

  3. Public key

  4. RSA

Answer: A,C

Question No: 204 – (Topic 3)

Which of the following viruses/worms uses the buffer overflow attack?

  1. Code red worm

  2. Nimda virus

  3. Chernobyl (CIH) virus

  4. Klez worm

Answer: A

Question No: 205 – (Topic 3)

TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN

packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

  1. Red Hat

  2. Windows

  3. Knoppix

  4. Solaris

Answer: B

Question No: 206 – (Topic 3)

Which of the following environmental variables represents the PID value of the last child process?

  1. $?

  2. $!

  3. $$

D. $!!

Answer: B

Question No: 207 – (Topic 3)

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?

Each correct answer represents a complete solution. Choose all that apply.

  1. It incorporates real-time reporting and real-time alerting.

  2. It comes only as a software package for user deployment.

  3. It is a software package for the statistical analysis and reporting of log files.

  4. It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches amp; routers etc.), syslog servers etc.

Answer: A,C,D

Question No: 208 – (Topic 3)

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

  1. E-mail bombing

  2. E-mail spoofing

  3. E-mail Spam

  4. E-mail Storm

Answer: C

Question No: 209 – (Topic 3)

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides #39;security through obscurity#39;. What technique is Maria using?

  1. Encryption

  2. Steganography

  3. RSA algorithm

  4. Public-key cryptography

Answer: B

Question No: 210 – (Topic 3)

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

  1. Data encrypted with the secret key can only be decrypted by another secret key.

  2. The distinguishing technique used in public key-private key cryptography is the use of

    symmetric key algorithms.

  3. Data encrypted by the public key can only be decrypted by the secret key.

  4. The secret key can encrypt a message, and anyone with the public key can decrypt it.

Answer: C,D

100% Free Download!
Download Free Demo:ECSS Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass ECSS Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE