Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
ECSS Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testking ECCouncil ECSS Dumps with VCE and PDF 41-50

September 26, 2017

EnsurePass
2017 Sep ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/ECSS.html

EC-Council Certified Security Specialist

Question No: 41 – (Topic 1)

John works as a Security Administrator for NetPerfect Inc. The company uses Windows- based

systems. A project has been assigned to John to track malicious hackers and to strengthen the company#39;s security system. John configures a computer system to trick malicious hackers into thinking that it is the company#39;s main server, which in fact is a decoy system to track hackers.

Which system is John using to track the malicious hackers?

  1. Honeypot

  2. Intrusion Detection System (IDS)

  3. Bastion host

  4. Honeytokens

Answer: A

Question No: 42 – (Topic 1)

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

  1. ARP spoofing

  2. Cross-site scripting

  3. Session fixation

  4. Session sidejacking

Answer: B,C,D

Question No: 43 – (Topic 1)

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

  1. Snooping

  2. UDP port scanning

  3. Port redirection

  4. Firewalking

Answer: C

Question No: 44 – (Topic 1)

Which of the following is used to authenticate asymmetric keys?

  1. Digital signature

  2. MAC Address

  3. Password

  4. Demilitarized zone (DMZ)

Answer: A

Question No: 45 – (Topic 1)

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

  1. Worm

  2. Adware

  3. Backdoor

  4. Spyware

Answer: C

Question No: 46 – (Topic 1)

Which of the following is a name, symbol, or slogan with which a product is identified?

  1. Copyright

  2. Trademark

  3. Trade secret

  4. Patent

Answer: B

Question No: 47 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

路Information gathering

路Determining network range

路Identifying active machines

路Finding open ports and applications

路OS fingerprinting

路Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Traceroute

  2. NeoTrace

  3. Cheops

  4. Ettercap

Answer: A,B,C

Question No: 48 – (Topic 1)

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. Replay attack

  2. DoS attack

  3. ARP spoofing

  4. Rainbow attack

Answer: B

Question No: 49 – (Topic 1)

Which of the following statements are correct about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.

  1. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the targetand the valid user cannot be active.

  2. Session hijacking is an attack in which an attacker takes over the session, and the valid user#39;ssession is disconnected.

  3. Session hijacking is an attack in which an attacker takes over the session, and the valid user#39;ssession is not disconnected.

  4. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the targetbut the valid user can be active.

Answer: C,D

Question No: 50 – (Topic 1)

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

  1. Fraggle

  2. Jolt

  3. Teardrop

  4. Ping of death

Answer: D

100% Free Download!
Download Free Demo:ECSS Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass ECSS Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE