Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

EC-Council Certified Security Specialist Question and Answers

EC-Council Certified Security Specialist

Last Update Jun 8, 2023
Total Questions : 337

We are offering FREE ECSS ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare ECSS free exam questions and then go for complete pool of EC-Council Certified Security Specialist test questions that will help you more.

ECSS pdf

ECSS PDF

$35  $99.99
ECSS Engine

ECSS Testing Engine

$42  $119.99
ECSS PDF + Engine

ECSS PDF + Testing Engine

$56  $159.99
Questions 1

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server.

The output of the scanning test is as follows:

C.\whisker.pl -h target_IP_address

-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1

mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

This vulnerability helps in a cross site scripting attack.

B.  

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.  

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

D.  

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

Discussion 0
Questions 2

Which of the following is a valid IP address for class B Networks?

Options:

A.  

225.128.98.7

B.  

212.136.45.8

C.  

80.33.5.7

D.  

172.157.88.3

Discussion 0
Questions 3

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:

A.  

gaining access

B.  

Preparation

C.  

Reconnaissance

D.  

Scanning

Discussion 0
Questions 4

You have been assigned the job of configuring wireless networks for a large company. The security of these networks is of great importance. One of the tools that you can use for applying security is Wireless Transport Layer Security (WTLS). What are the goals of using this tool?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

To provide authentication between the two end points

B.  

To provide data integrity

C.  

To provide privacy for the two end users

D.  

To provide data availability

Discussion 0
Questions 5

Which of the following Linux rootkits is installed via stolen SSH keys?

Options:

A.  

Phalanx2

B.  

Beastkit

C.  

Adore

D.  

Linux.Ramen

Discussion 0
Questions 6

Which of the following statements best describes a certification authority?

Options:

A.  

A certification authority is a type of encryption that uses a public key and a private key pair fordata encryption.

B.  

A certification authority is an entity that issues digital certificates for use by other parties.

C.  

A certification authority is a technique to authenticate digital documents by using computercryptography.

D.  

A certification authority is a type of encryption that uses a single key to encrypt and decryp t data.

Discussion 0
Questions 7

Which of the following security protocols are based on the 802.11i standard?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

WEP

B.  

WPA2

C.  

WPA

D.  

WEP2

Discussion 0
Questions 8

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

Options:

A.  

Fraggle

B.  

Jolt

C.  

Teardrop

D.  

Ping of death

Discussion 0
Questions 9

John works as an Office Assistant in DataSoft Inc. He has received an e-mail from duesoft_lotterygroup@us.com with the following message:

The DueSoft Lottery Incorporation

This is to inform you that you have just won a prize of $7,500.00 for this year's Annual Lottery promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect active online e-mails and select five people every year as our winners through an electronic balloting machine. Please reply within three days of receiving this e-mail with your full details like Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your prize.

If John replies to this e-mail, which of the following attacks may he become vulnerable to?

Options:

A.  

Salami attack

B.  

Man-in-the-Middle attack

C.  

Phishing attack

D.  

DoS attack

Discussion 0
Questions 10

The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.  

Preventing denial-of-service attacks.

B.  

Providing two-factor authentication.

C.  

Ensuring secure authentication.

D.  

Protecting employee data on portable computers.

E.  

Implementing Certificate services on Texas office.

F.  

Preventing unauthorized network access.

G.  

Providing secure communications between the overseas office and the headquarters.

Discussion 0
Questions 11

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.  

Stateful firewall

B.  

Packet filter firewall

C.  

Proxy-based firewall

D.  

Endian firewall

Discussion 0
Questions 12

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

·Network diagrams of the we-are-secure infrastructure

·Source code of the security tools

· IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:

A.  

Whitebox

B.  

Blackbox

C.  

Graybox

D.  

Alpha testing

Discussion 0
Questions 13

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Using WEP encryption

B.  

Using WPA encryption

C.  

Not broadcasting SSID

D.  

MAC filtering the router

Discussion 0
Questions 14

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Modem

B.  

Console

C.  

Sensor

D.  

Gateway

E.  

Firewall

Discussion 0
Questions 15

Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Denial-of-Service (DoS) attack

B.  

E-mail spoofing

C.  

Port scan attack

D.  

Shoulder surfing

Discussion 0
Questions 16

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

Options:

A.  

One who can give a firsthand account of something seen, heard, or experienced.

B.  

One with special knowledge of the subject about which he or she is testifying.

C.  

One who observes an event.

D.  

One who is not qualified as an expert witness.

Discussion 0
Questions 17

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

TCP session hijacking is when a hacker takes over a TCP session between two machines.

B.  

It is used to slow the working of victim's network resources.

C.  

Use of a long random number or string as the session key reduces session hijacking.

D.  

It is the exploitation of a valid computer session to gain unauthorized access to informationor services in a computer system.

Discussion 0
Questions 18

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.  

Role Based Access Control (RBAC)

B.  

Mandatory Access Control (MAC)

C.  

Access Control List (ACL)

D.  

Discretionary Access Control (DAC)

Discussion 0
Questions 19

Which of the following is used to provide a protective shield for the data passing over the Internet?

Options:

A.  

Firewall

B.  

Tunneling

C.  

Proxy server

D.  

Intrusion detection system

Discussion 0
Questions 20

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

Options:

A.  

Encryption

B.  

Steganography

C.  

RSA algorithm

D.  

Public-key cryptography

Discussion 0
Questions 21

Which of the following is used over the Internet for better security?

Options:

A.  

SOCKS

B.  

IMAP Server

C.  

Wingate

D.  

S-HTTP

Discussion 0
Questions 22

Which of the following codes is used to crack Windows login passwords?

Options:

A.  

I love you code

B.  

Glide code

C.  

Code red

D.  

Code blue

Discussion 0
Questions 23

A ________ attack is designed to bring loss of network connectivity and services by consuming the bandwidth of a user's network.

Options:

A.  

Dictionary

B.  

Brute force

C.  

Man-in-the-middle

D.  

Denial of Service (DoS)

Discussion 0
Questions 24

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.  

Endian firewall

B.  

Stateful firewall

C.  

Packet filter firewall

D.  

Proxy-based firewall

Discussion 0
Questions 25

Which of the following is provided by Digital signatures?

Options:

A.  

Security and Integrity.

B.  

Integrity and Validation.

C.  

Authentication and Identification.

D.  

Identification and Validation.

Discussion 0
Questions 26

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.  

Stunnel

B.  

IPChains

C.  

IPTables

D.  

OpenSSH

Discussion 0
Questions 27

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

Options:

A.  

One who observes an event.

B.  

One with special knowledge of the subject about which he or she is testifying.

C.  

One who can give a firsthand account of something seen, heard, or experienced.

D.  

One who is not qualified as an expert witness.

Discussion 0
Questions 28

An Anti-Virus software is used to prevent, detect, and remove malware from a system, including computer viruses, worms, and Trojan horses. Which of the following companies are the providers of Anti-virus softwares?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Kaspersky Lab

B.  

Symantec Corporation

C.  

AVG Technologies

D.  

McAfee Inc.

E.  

F-Secure Corporation

Discussion 0
Questions 29

Which of the following protocols is used the most by web servers?

Options:

A.  

COM

B.  

FTP

C.  

HTTP

D.  

ORG

Discussion 0
Questions 30

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

Options:

A.  

Port redirection

B.  

Snooping

C.  

UDP port scanning

D.  

Firewalking

Discussion 0
Questions 31

Which of the following is an example of a low-interaction production honeypot that is developed and sold by the Swiss company Netsec?

Options:

A.  

ManTrap

B.  

Specter

C.  

KFSensor

D.  

Honeyd

Discussion 0
Questions 32

Which of the following attacks is used to hack simple alphabetical passwords?

Options:

A.  

Man-in-the-middle attack

B.  

Dictionary-based attack

C.  

Black hat attack

D.  

Sniffing

Discussion 0
Questions 33

Which of the following commands is used in Mac OS X to exit Open Firmware and to continue the booting process?

Options:

A.  

mac-load

B.  

boot

C.  

load

D.  

mac-boot

Discussion 0
Questions 34

Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the following violations has been committed by Mola Co.?

Options:

A.  

Copyright infringement

B.  

Trademark infringement

C.  

Patent law

D.  

Plagiarism

Discussion 0
Questions 35

Which of the following attacks is a man-in-the-middle exploit where a third party can gain HTTPS cookie data?

Options:

A.  

Cookie poisoning

B.  

CookieMonster attack

C.  

Cross site scripting attack

D.  

Smart Force Attack

Discussion 0
Questions 36

You work as a Network Administrator for Infonet Inc. The company's office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?

Options:

A.  

Internet service provider's DNS server address

B.  

I/O address

C.  

Service Set Identifier

D.  

Demilitarized zone

Discussion 0
Questions 37

Which of the following tools is used to catch someone installing a rootkit or running a packet sniffer?

Options:

A.  

chkrootkit

B.  

rkhunter

C.  

Blue Pill

D.  

OSSEC

Discussion 0
Questions 38

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

OpenSSH

B.  

Telnet

C.  

Rlogin

D.  

SSL

Discussion 0
Questions 39

Which of the following viruses/worms uses the buffer overflow attack?

Options:

A.  

Nimda virus

B.  

Code red worm

C.  

Chernobyl (CIH) virus

D.  

Klez worm

Discussion 0
Questions 40

Which of the following malware spread through the Internet and caused a large DoS attack in

1988?

Options:

A.  

Morris worm

B.  

SQL slammer worm

C.  

Klez worm

D.  

LoveLetter worm

Discussion 0
Questions 41

You work as a Network Administrator for DataSoft Inc. The company needs a secure network. You have been assigned the task to track the network attacks that have occurred within the last one month. To accomplish the task, you need to scan the log files for suspicious events and patterns.

Which of the following will you use to scan the log files?

Options:

A.  

PsTools suite

B.  

System Integrity Verifiers (SIV)

C.  

Log File Monitor (LFM)

D.  

Specter

Discussion 0
Questions 42

You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program's output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?

Options:

A.  

cat

B.  

less

C.  

more

D.  

tee

Discussion 0
Questions 43

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He observes that the We-are-secure server is vulnerable to a special type of DoS attack and he makes the following suggestions to the security authority to protect the server from this DoS attack. The countermeasures against this type of DoS attack are as follows:

l Disabling IP-directed broadcasts at the We-are-secure router

l Configuring local computers so as not to respond to such ICMP packets that are configured to be sent to IP broadcast addresses

Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure security network?

Options:

A.  

Smurf attack

B.  

Jolt attack

C.  

Fraggle attack

D.  

Teardrop attack

Discussion 0
Questions 44

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.  

Copyright law

B.  

Cyber law

C.  

Espionage law

D.  

Trademark law

Discussion 0
Questions 45

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

Options:

A.  

Microsoft Internet Security & Acceleration Server (ISA)

B.  

Wingate

C.  

SOCKS

D.  

Sniffer

Discussion 0
Questions 46

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.  

Incident response policy

B.  

Account lockout policy

C.  

Separation of duties

D.  

Chain of custody

Discussion 0
Questions 47

You manage a Windows Server 2008 server named uCert1 in a domain named PassGuide.com.

uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named

PassGuideInternal.

You want to ensure that all authentication traffic to the Web site is encrypted securely without the use of SSL. You disable Anonymous Authentication. What else should you do?

Options:

A.  

Enable Windows Authentication and Forms Authentication.

B.  

Enable Windows Authentication and Digest Authentication.

C.  

Enable Basic Authentication and Windows Authentication.

D.  

Enable Digest Authentication and Forms Authentication.

Discussion 0
Questions 48

Which of the following software can be used to protect a computer system from external threats (viruses, worms, malware, or Trojans) and malicious attacks?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.  

Employee monitoring software

B.  

Burp Suite

C.  

Antivirus

D.  

Firewall

Discussion 0
Questions 49

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

Options:

A.  

Worm

B.  

Adware

C.  

Backdoor

D.  

Spyware

Discussion 0
Questions 50

Which of the following wireless networks transmits data probably at 115 Kbps?

Options:

A.  

WWAN

B.  

WLAN

C.  

WMAN

D.  

WPAN

Discussion 0