[Free] 2018(Jan) EnsurePass Testking ECCouncil ECSS Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 31 – (Topic 1)

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Download folder

  2. History folder

  3. Temporary Internet Folder

  4. Cookies folder

Answer: B,C,D

Question No: 32 – (Topic 1)

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Samhain

  2. Tripwire

  3. Snort

  4. SARA

Answer: A,C

Question No: 33 – (Topic 1)

You manage a Windows Server 2008 server named uCert1 in a domain named PassGuide.com.

uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named PassGuideInternal.

You want to ensure that all authentication traffic to the Web site is encrypted securely without the use of SSL. You disable Anonymous Authentication. What else should you do?

  1. Enable Windows Authentication and Forms Authentication.

  2. Enable Windows Authentication and Digest Authentication.

  3. Enable Basic Authentication and Windows Authentication.

  4. Enable Digest Authentication and Forms Authentication.

Answer: B

Question No: 34 – (Topic 1)

Which of the following password cracking attacks does not use any software for cracking e- mail passwords?

Each correct answer represents a complete solution. Choose all that apply.

  1. Brute force attack

  2. Shoulder surfing

  3. Social engineering

  4. Dictionary attack

Answer: B,C

Question No: 35 – (Topic 1)

You work as a Sales Manager for NetPerfect Inc. The company has a Windows-based network. You have to often send confidential e-mails and make online payments and purchases. You want to protect transmitted information and also to increase the security of e-mail communications. Which of the following programs or services will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Anonymizer

  2. John the Ripper

  3. THC Hydra

  4. Pretty Good Privacy (PGP)

Answer: A,D

Question No: 36 – (Topic 1)

The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.? (Click the Exhibit button on the toolbar to see the case study.)

  1. Preventing denial-of-service attacks.

  2. Providing two-factor authentication.

  3. Ensuring secure authentication.

  4. Protecting employee data on portable computers.

  5. Implementing Certificate services on Texas office.

  6. Preventing unauthorized network access.

  7. Providing secure communications between the overseas office and the headquarters.

  8. Providing secure communications between Washington and the headquarters office.

Answer: C,D,F,G

Question No: 37 – (Topic 1)

According to the Internet Crime Report 2009, which of the following complaint categories is on the top?

  1. Identity theft

  2. Advanced fee fraud

  3. Non-delivered merchandise/payment

  4. FBI scams

Answer: D

Question No: 38 – (Topic 1)

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides #39;security through obscurity#39;. What technique is Maria using?

  1. Steganography

  2. Public-key cryptography

  3. Encryption

  4. RSA algorithm

Answer: A

Question No: 39 – (Topic 1)

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

  1. Incident response policy

  2. Chain of custody

  3. Chain of evidence

  4. Evidence access policy

Answer: B

Question No: 40 – (Topic 1)

Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.

Peter#39;s manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager#39;s system?

Each correct answer represents a complete solution. Choose two.

  1. rwho -a

  2. lastb

  3. last

  4. pwd

Answer: B,C

100% Ensurepass Free Download!
Download Free Demo:ECSS Demo PDF
100% Ensurepass Free Guaranteed!
ECSS Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No