[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil ECSS Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 171 – (Topic 2)

Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new company, starts manufacturing, marketing, selling, and distributing non- alcoholic potables like Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the following violations has been committed by Mola Co.?

  1. Trademark infringement

  2. Plagiarism

  3. Patent law

  4. Copyright infringement

Answer: A

Question No: 172 – (Topic 2)

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

Ensurepass 2018 PDF and VCE

What is the IP address of the sender of this email?





Answer: A

Question No: 173 – (Topic 2)

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect#39;s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

  1. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

  2. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

  3. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

  4. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

Answer: D

Question No: 174 – (Topic 2)

Which of the following organizations is dedicated to computer security research and information sharing?

  1. NIPC

  2. FBI

  3. Honeynet Project

  4. IEEE

Answer: C

Question No: 175 – (Topic 2)

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company.

Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Text Semagrams

  2. Perceptual masking

  3. Linguistic steganography

  4. Technical steganography

Answer: A,C

Question No: 176 – (Topic 2)

John works as a Desktop Technician for NetPerfect Inc. The company has a Windows- based network. For the last few days, the network of the company has become prone to the Man-in-the- Middle attack. John wants to send a confidential MS-Word file to his Manager through e-mail attachment. He wants to ensure that no one is able to open and

understand the file#39;s message except the Manager. Which of the following should John use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Format the file

  2. Apply password to the file

  3. Encryption

  4. File Compression

Answer: B,C

Question No: 177 – (Topic 2)

Which of the following statements correctly defines a script kiddie?

  1. He is an individual who breaks communication systems to perform hacking.

  2. He is an individual who has lost respect and integrity as an employee in any organization.

  3. He is an individual who uses hacking programs developed by others to attack information systems and spoil websites.

  4. He is an individual who is an expert in various computer fields such as operating systems, networking, hardware, software, etc. and enjoys the mental challenge of decoding computer programs, solving network vulnerabilities and security threats, etc

Answer: C

Question No: 178 – (Topic 2)

Which of the following is allowed by a company to be addressed directly from the public network and is hardened to screen the rest of its network from security exposure?

  1. bastion host

  2. Intrusion detection system

  3. A computer installed in the network and configured with sender reputation

  4. Exchange ActiveSync

Answer: A

Question No: 179 – (Topic 2)

Which of the following types of authentication messages are supported by the TACACS

protocol by default?

Each correct answer represents a complete solution. Choose all that apply.

  1. Telnet

  2. Kerberos

  3. Username/password

  4. ARP

  5. PAP

  6. CHAP

  7. SLIP

Answer: A,C,D,E,F,G

Question No: 180 – (Topic 2)

Which of the following malware spread through the Internet and caused a large DoS attack in


  1. Morris worm

  2. SQL slammer worm

  3. Klez worm

  4. LoveLetter worm

Answer: A

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.