[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil ECSS Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 91 – (Topic 1)

Which of the following tools provides a great solution for auditing and testing the recognition and response capabilities of the corporate security defenses?

  1. Traffic IQ Professional

  2. IPSentry

  3. Burp Suite

  4. F-Secure

Answer: A

Question No: 92 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using dumpster diving to gather information about Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving come under?

  1. Gaining access

  2. Scanning

  3. Maintaining access

  4. Reconnaissance

Answer: D

Question No: 93 – (Topic 1)

Which of the following software can be used to protect a computer system from external threats (viruses, worms, malware, or Trojans) and malicious attacks?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Employee monitoring software

  2. Burp Suite

  3. Antivirus

  4. Firewall

Answer: C,D

Question No: 94 – (Topic 1)

You want to rename a file foo to the file bar and move the file bar to the /tmp folder. Which of the following commands will you use to accomplish the task?

  1. mv bar /temp/foo

  2. ren foo /tmp/bar

  3. mv foo /tmp/bar

  4. ren bar /tml/foo

Answer: C

Topic 2, Volume B

Question No: 95 – (Topic 2)

Brutus is a password cracking tool that can be used to crack the following authentications:

路HTTP (Basic Authentication)


路POP3 (Post Office Protocol v3)

路FTP (File Transfer Protocol)

路SMB (Server Message Block)


Which of the following attacks can be performed by Brutus for password cracking? Each correct answer represents a complete solution. Choose all that apply.

  1. Hybrid attack

  2. Dictionary attack

  3. Brute force attack

  4. Man-in-the-middle attack

  5. Replay attack

Answer: A,B,C

Question No: 96 – (Topic 2)

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name.

Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

  1. Copyright law

  2. Cyber law

  3. Espionage law

  4. Trademark law

Answer: D

Question No: 97 – (Topic 2)

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?

  1. WMA/TrojanDownloader.GetCodec

  2. Win32/PSW.OnLineGames

  3. Win32/Agent

  4. Win32/Conflicker

Answer: D

Question No: 98 – (Topic 2)

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

  1. Confidentiality

  2. Authentication

  3. Integrity

  4. Non-repudiation

Answer: A

Question No: 99 – (Topic 2)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

  1. Ethercap

  2. Tripwire

  3. IPChains

  4. Hunt

Answer: D

Question No: 100 – (Topic 2)

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?

Each correct answer represents a complete solution. Choose all that apply.

  1. It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches amp; routers etc.), syslog servers etc.

  2. It incorporates real-time reporting and real-time alerting.

  3. It comes only as a software package for user deployment.

  4. It is a software package for the statistical analysis and reporting of log files.

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.