[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil ECSS Dumps with VCE and PDF 211-220

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 211 – (Topic 3)

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect#39;s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

  1. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

  2. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

  3. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

  4. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

Answer: C

Question No: 212 – (Topic 3)

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. DoS attack

  2. Rainbow attack

  3. ARP spoofing

  4. Replay attack

Answer: A

Question No: 213 – (Topic 3)

Fill in the blank with the appropriate name of the attack.

takes best advantage of an existing authenticated connection

A. session hijacking

Answer: A

Question No: 214 – (Topic 3)

Which of the following commands is used to make traceroute wait 5 seconds for a response to a packet?

  1. traceroute -T

  2. traceroute -q

  3. traceroute -r

  4. traceroute -w

Answer: D

Question No: 215 – (Topic 3)

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

  1. Port redirection

  2. Snooping

  3. UDP port scanning

  4. Firewalking

Answer: A

Question No: 216 – (Topic 3)

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

  1. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

  2. Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

  3. Routers do not limit physical broadcast traffic.

  4. Routers act as protocol translators and bind dissimilar networks.

Answer: A,B,D

Question No: 217 – (Topic 3)

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the layer of the OSI model.

A. transport

Answer: A

Question No: 218 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Ensurepass 2018 PDF and VCE

Which of the following tools is John using to crack the wireless encryption keys?

  1. Cain

  2. Kismet

  3. PsPasswd

  4. AirSnort

Answer: D

Question No: 219 – (Topic 3)

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name.

Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

  1. Copyright law

  2. Cyber law

  3. Espionage law

  4. Trademark law

Answer: D

Question No: 220 – (Topic 3)

Which of the following statements are true about firewalking?

Each correct answer represents a complete solution. Choose all that apply.

  1. To use firewalking, the attacker needs the IP address of the last known gateway before thefirewall and the IP address of a host located behind the firewall.

  2. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.

  3. Firewalking works on the UDP packets.

  4. A malicious attacker can use firewalking to determine the types of ports/protocols that canbypass the firewall.

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.