[Free] 2018(Jan) EnsurePass Testking ECCouncil ECSS Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSS
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Specialist

Question No: 81 – (Topic 1)

An Anti-Virus software is used to prevent, detect, and remove malware from a system, including computer viruses, worms, and Trojan horses. Which of the following companies are the providers of Anti-virus softwares?

Each correct answer represents a complete solution. Choose all that apply.

  1. Symantec Corporation

  2. F-Secure Corporation

  3. AVG Technologies

  4. Kaspersky Lab

  5. McAfee Inc.

Answer: A,B,C,D,E

Question No: 82 – (Topic 1)

Burp Suite is a Java application for attacking web applications. This tool includes a proxy

server, a spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?

  1. Repeater

  2. Spider

  3. Intruder

  4. Proxy Server

Answer: A

Question No: 83 – (Topic 1)

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.

The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

  1. Jason did not perform a vulnerability assessment.

  2. Jason did not perform port scanning.

  3. Jason did not perform foot printing.

  4. Jason did not perform OS fingerprinting.

  5. Jason did not perform covering tracks.

Answer: E

Question No: 84 – (Topic 1)

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

路Network diagrams of the we-are-secure infrastructure

路Source code of the security tools

  • IP addressing information of the we-are-secure network

    Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

    1. Whitebox

    2. Blackbox

    3. Graybox

    4. Alpha testing

    Answer: A

    Question No: 85 – (Topic 1)

    Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

    1. Stateful firewall

    2. Packet filter firewall

    3. Proxy-based firewall

    4. Endian firewall

    Answer: C

    Question No: 86 – (Topic 1)

    Which of the following layers of the OSI model provides non-repudiation services?

    1. The application layer

    2. The physical layer

    3. The data-link layer

    4. The presentation layer

    Answer: A

    Question No: 87 – (Topic 1)

    Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from various resources such as Apache log files, IIS logs, streaming servers, and some FTP servers. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use AWStats application. Which of the following statements are true about AWStats?

    Each correct answer represents a complete solution. Choose all that apply.

    1. It generates advanced Web, streaming, mail server statistics graphically.

    2. It can analyze log files server tools such as Apache log files, WebStar, IIS and other Web, proxy, and some ftp servers.

    3. It can work with all Web hosting providers, which allow Perl, CGI and log access.

    4. It works only as a CGI and shows all possible information contained in log.

    Answer: A,B,C

    Question No: 88 – (Topic 1)

    Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

    1. Twofish

    2. Digital certificates

    3. Public key

    4. RSA

    Answer: B,C

    Question No: 89 – (Topic 1)

    You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

    1. Only users within the company.

    2. Only users with the correct WEP key.

    3. Only the administrator.

    4. Anyone can authenticate.

    Answer: B

    Question No: 90 – (Topic 1)

    Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

    1. One who can give a firsthand account of something seen, heard, or experienced.

    2. One with special knowledge of the subject about which he or she is testifying.

    3. One who observes an event.

    4. One who is not qualified as an expert witness.

    Answer: D

    100% Ensurepass Free Download!
    Download Free Demo:ECSS Demo PDF
    100% Ensurepass Free Guaranteed!
    ECSS Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No