ECCouncil ECSS Certified Security Specialist Practice Exam Set 8

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?


Options are :

  • Eradication phase
  • Preparation phase (Correct)
  • Identification phase
  • Recovery phase

Answer : Preparation phase

Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice? Each correct answer represents a part of the solution. Choose all that apply.


Options are :

  • Identify
  • Look (Correct)
  • Stop (Correct)
  • Call (Correct)

Answer : Look Stop Call

Which of the following tools can be used for steganography? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Image hide (Correct)
  • Anti-x
  • Stegbreak
  • Snow.exe (Correct)

Answer : Image hide Snow.exe

EC0-232 EC-Council E-Commerce Architect Practice Test Set 1

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.


Options are :

  • The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.
  • Data encrypted by the public key can only be decrypted by the secret key (Correct)
  • The secret key can encrypt a message, and anyone with the public key can decrypt it. (Correct)
  • Data encrypted with the secret key can only be decrypted by another secret key

Answer : Data encrypted by the public key can only be decrypted by the secret key The secret key can encrypt a message, and anyone with the public key can decrypt it.

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?


Options are :

  • Jason did not perform foot printing.
  • Jason did not perform OS fingerprinting.
  • Jason did not perform a vulnerability assessment.
  • Jason did not perform covering tracks. (Correct)
  • Jason did not perform port scanning.

Answer : Jason did not perform covering tracks.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following preattack phases while testing the security of the server: • Footprinting • Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it? Each correct answer represents a complete solution. Choose all that apply


Options are :

  • PsFile (Correct)
  • PsPasswd (Correct)
  • UserInfo (Correct)
  • WinSSLMiM

Answer : PsFile PsPasswd UserInfo

ECCouncil ECSS Certified Security Specialist Practice Exam Set 9

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?


Options are :

  • Confidentiality (Correct)
  • Authentication
  • Non-repudiation
  • Integrity

Answer : Confidentiality

You work as the Network Administrator for McNeil Inc. The company has a Linux-based network. You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file named file2 rather than being displayed on the screen Which of the following tools should you use to accomplish the task?


Options are :

  • My_program 2> file2 (Correct)
  • My_program > file2
  • My_program 2>> file2
  • My_program >> file2

Answer : My_program 2> file2

Burp Suite is a Java application for attacking web applications. This tool includes a proxy server, a spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?


Options are :

  • Proxy Server
  • Intruder
  • Repeater (Correct)
  • Spider

Answer : Repeater

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 3

You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure. Which of the following tools can you use to accomplish the task?


Options are :

  • httprint (Correct)
  • Wget
  • WinSSLMiM
  • Whisker

Answer : httprint

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?


Options are :

  • Bastion host (Correct)
  • LMHOSTS
  • Firewal
  • Gateway

Answer : Bastion host

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?


Options are :

  • One who observes an event.
  • One who is not qualified as an expert witness (Correct)
  • One with special knowledge of the subject about which he or she is testifying
  • One who can give a firsthand account of something seen, heard, or experienced.

Answer : One who is not qualified as an expert witness

ECCouncil ECSS Certified Security Specialist Practice Exam Set 5

Which of the following software helps in protecting the computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • THC Hydra
  • BitDefender (Correct)
  • Windows Defender (Correct)
  • John the Ripper

Answer : BitDefender Windows Defender

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?


Options are :

  • NetStumbler (Correct)
  • AiroPeek
  • Snort
  • Cain

Answer : NetStumbler

Which of the following tools is used to catch someone installing a rootkit or running a packet sniffer?


Options are :

  • rkhunter
  • OSSEC
  • Blue Pill
  • chkrootkit (Correct)

Answer : chkrootkit

312-50V8 Ethical Hacker V8 Certification Practice Test Set 10

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using dumpster diving to gather information about Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving come under?


Options are :

  • Maintaining access
  • Gaining access
  • Scanning
  • Reconnaissance (Correct)

Answer : Reconnaissance

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network: •Network diagrams of the we-are-secure infrastructure •Source code of the security tools • IP addressing information of the we-are-secure network Which of the following testing methodologies is we-are-secure.com using to test the security of its network?


Options are :

  • Graybox
  • Whitebox (Correct)
  • Alpha testing
  • Blackbox

Answer : Whitebox

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?


Options are :

  • Win32/Agent
  • WMA/TrojanDownloader.GetCodec
  • Win32/PSW.OnLineGames
  • Win32/Conflicker (Correct)

Answer : Win32/Conflicker

EC0-232 EC-Council E-Commerce Architect Practice Test Set 7

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?


Options are :

  • External threat
  • Internal threat (Correct)
  • Malware
  • Zombie

Answer : Internal threat

Which of the following are the types of DOS commands? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • External commands (Correct)
  • Direct commands
  • Internal commands (Correct)
  • Active commands

Answer : External commands Internal commands

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?


Options are :

  • Sniffer
  • Wingate (Correct)
  • SOCKS
  • Microsoft Internet Security & Acceleration Server (ISA)

Answer : Wingate

ECCouncil ECSS Certified Security Specialist Practice Exam Set 4

Which of the following malicious software is used by several advertising websites for downloading and displaying advertisements in the Web browser without user permission?


Options are :

  • Adware (Correct)
  • Worm
  • Blended threat
  • Trojan horse

Answer : Adware

Brutus is a password cracking tool that can be used to crack the following authentications: •HTTP (Basic Authentication) •HTTP (HTML Form/CGI) •POP3 (Post Office Protocol v3) •FTP (File Transfer Protocol) •SMB (Server Message Block) •Telnet Which of the following attacks can be performed by Brutus for password cracking? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Hybrid attack (Correct)
  • Man-in-the-middle attack
  • Dictionary attack (Correct)
  • Brute force attack (Correct)

Answer : Hybrid attack Dictionary attack Brute force attack

Which of the following software can be used to protect a computer system from external threats (viruses, worms, malware, or Trojans) and malicious attacks? Each correct answer represents a part of the solution. Choose all that apply


Options are :

  • Antivirus (Correct)
  • Burp Suite
  • Firewa (Correct)
  • Employee monitoring software

Answer : Antivirus Firewa

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 4

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • It is a software package for the statistical analysis and reporting of log files. (Correct)
  • It incorporates real-time reporting and real-time alerting (Correct)
  • It comes only as a software package for user deployment.
  • t is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches & routers etc.), syslog servers etc. (Correct)

Answer : It is a software package for the statistical analysis and reporting of log files. It incorporates real-time reporting and real-time alerting t is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches & routers etc.), syslog servers etc.

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?


Options are :

  • Anyone can authenticate.
  • Only users within the company.
  • Only the administrator
  • Only users with the correct WEP key. (Correct)

Answer : Only users with the correct WEP key.

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?


Options are :

  • E-mail spoofing
  • E-mail Storm
  • E-mail bombing
  • E-mail Spam (Correct)

Answer : E-mail Spam

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 8

You work as a computer operator for BlueWells Inc. The company has a Windows-based network.You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about?


Options are :

  • Anti-Virus
  • Adware
  • Keylogger (Correct)
  • Spyware

Answer : Keylogger

You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network. You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed? Each correct answer represents a part of the solution. Choose all that apply.


Options are :

  • Buffer-overflow attack
  • Social engineering (Correct)
  • E-mail spoofing (Correct)
  • Zero-day attack

Answer : Social engineering E-mail spoofing

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Rainbow attack (Correct)
  • Buffer-overflow attack
  • Zero-day attack
  • Dictionary-based attack (Correct)
  • Social engineering (Correct)
  • Brute force attack (Correct)

Answer : Rainbow attack Dictionary-based attack Social engineering Brute force attack

ECCouncil 312-49v8 Computer Hacking Investigator Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions