[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil ECSS Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 131 – (Topic 2)

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

  1. Demilitarized zone (DMZ)

  2. Intrusion detection system (IDS)

  3. Firewall

  4. Packet filtering

Answer: B

Question No: 132 – (Topic 2)

You work as a Network Administrator for Infonet Inc. The company#39;s office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?

  1. Internet service provider#39;s DNS server address

  2. I/O address

  3. Service Set Identifier

  4. Demilitarized zone

Answer: C

Question No: 133 – (Topic 2)

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

  1. Role Based Access Control (RBAC)

  2. Mandatory Access Control (MAC)

  3. Access Control List (ACL)

  4. Discretionary Access Control (DAC)

Answer: B

Question No: 134 – (Topic 2)

You work as a Network Administrator for DataSoft Inc. The company needs a secure network. You have been assigned the task to track the network attacks that have occurred within the last one month. To accomplish the task, you need to scan the log files for suspicious events and patterns.

Which of the following will you use to scan the log files?

  1. PsTools suite

  2. System Integrity Verifiers (SIV)

  3. Log File Monitor (LFM)

  4. Specter

Answer: C

Question No: 135 – (Topic 2)

Which of the following is a valid IP address for class B Networks?





Answer: D

Question No: 136 – (Topic 2)

Maria works as a Security Administrator for NetPerfect Inc. The company has a Windows- based network. Maria wants to ensure that the Sales executives of the company are able to surf the Internet only through a secure URL. Which of the following protocols provides a secure connection to the Internet?

  1. FTP

  2. HTTPS

  3. HTTP

  4. WAP

Answer: B

Question No: 137 – (Topic 2)

Sam, a bank employee, develops a program and uploads it to the bank#39;s server. He deducts $1 a month from the account of every customer using the program. Probably no account holder will notice this type of illegal debit, but Sam will make a good amount of money every month. Which of the following types of cybercrime is Sam performing?

  1. Data diddling

  2. Salami attack

  3. Web jacking

  4. Web defacement

Answer: B

Question No: 138 – (Topic 2)

According to the Sophos Security Threat Report 2009, which amongst the following countries is on the top, in hosting malware on the web?

  1. Russia

  2. China

  3. Germany

  4. United States

Answer: D

Question No: 139 – (Topic 2)

You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program#39;s output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?

  1. cat

  2. less

  3. more

  4. tee

Answer: D

Question No: 140 – (Topic 2)

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

  1. S/MIME

  2. IPSec

  3. PGP

  4. TLS

Answer: A,C

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.