[Free] 2018(Jan) EnsurePass Testking ECCouncil ECSS Dumps with VCE and PDF 191-200

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 191 – (Topic 3)

Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

  1. I love you

  2. Melissa

  3. Brain

  4. Tequila

Answer: C

Question No: 192 – (Topic 3)

RRD Job World wants to upgrade its network. The company decides to implement a TCP/IP-based network. According to the case study, RRD Job World is concerned about security. Which of the following methods should the on-site employees use to communicate securely with the headquarters?

(Click the Exhibit button on the toolbar to see the case study.)

  1. L2TP over IPSec

  2. Windows NT Challenge/Response (NTLM) authentication

  3. DNS security and group policies

  4. Basic (Clear Text) authentication using SSL

Answer: D

Question No: 193 – (Topic 3)

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Web server logs

  2. Event logs

  3. System logs

  4. Program logs

Answer: B,C,D

Question No: 194 – (Topic 3)

Which two security components should you implement on the sales personnel portable computers to increase security?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. Remote access policy

  2. L2TP over IPSec

  3. Encrypting File System (EFS)

  4. Remote Authentication Dial-In User Service (RADIUS)

  5. PPTP

Answer: B,C

Question No: 195 – (Topic 3)

You work as a Network Administrator for Infonet Inc. The company#39;s office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?

  1. Service Set Identifier

  2. Internet service provider#39;s DNS server address

  3. Demilitarized zone

  4. I/O address

Answer: A

Question No: 196 – (Topic 3)

Which of the following Trojans is used by attackers to modify the Web browser settings?

  1. Trojan.Lodear

  2. Win32/Pacex.Gen

  3. WMA/TrojanDownloader.GetCodec

  4. Win32/FlyStudio

Answer: D

Question No: 197 – (Topic 3)

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

  1. One who observes an event.

  2. One with special knowledge of the subject about which he or she is testifying.

  3. One who can give a firsthand account of something seen, heard, or experienced.

  4. One who is not qualified as an expert witness.

Answer: D

Question No: 198 – (Topic 3)

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

  1. Change the entire security policy.

  2. Start the Incident handling process.

  3. Switch to a new network infrastructure.

  4. Perform an IT audit.

Answer: D

Question No: 199 – (Topic 3)

You work as a Network Administrator for Infonet Inc. The company#39;s network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network.

Where will you place the Web server?

  1. With the authentication server

  2. In a demilitarized zone (DMZ)

  3. With the database server

  4. In a virtual private network (VPN)

Answer: B

Question No: 200 – (Topic 3)

Which of the following DoS attacks attempts to block service or reduce activity on a host by sending ping requests directly to the victim?

  1. Land attack

  2. Ping flood attack

  3. SYN flood attack

  4. Teardrop attack

Answer: B

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No