Exam Code : ECP-206
Exam Name : Certified Associate - IP Networking
Vendor Name :
"Ericsson"
ECSS Dumps ECSS Braindumps
ECSS Real Questions ECSS Practice Test ECSS Actual Questions
killexams.com EC-Council ECSS
EC-Council Certified Security Specialist
https://killexams.com/pass4sure/exam-detail/ECSS
Which of the following forensic tool suite is developed for Linux operating system?
MForensicsLab
S.M.A.R.T.
Wetstone
ProDiscover
Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?
Containment
Detection
Preparation
Eradication
Which of the following is a transport layer circuit-level proxy server?
Bastion host
UDP proxy
SOCKS
Forced proxy
What is the size of Master Boot Record (MBR)?
512 bytes
256 bytes
1 KB
2 KB
Which of the following commands is used to test a network connection?
Popd
Path
Perfmon
Ping
Which of the following statements is true about a honeyfarm?
It is a computer system used to attract hackers to identify them.
It is a computer system that has no security.
It is a centralized collection of honeypots.
It is a firewall.
Which of the following tools is used to verify Group Policy Object (GPO) settings?
Psinfo
Resplendent registrar
Fport
Pslist
Which of the following techniques is used to log network traffic?
Cracking
IP address spoofing
Sniffing
Tunneling
Which of the following statements explains the dumpster diving hacking technique?
This is an information gathering technique in which the attacker runs a software program to automatically call thousands of telephone numbers to find out a victim who has attached a modem to the Internet.
This is an information gathering technique in which an attacker rummages through all the discarded waste-papers in the victim's trash.
This is an information gathering technique in which the attacker calls the help center of the organization and asks someone to reset a password.
This is an information gathering technique in which the attacker injects a Trojan in the victim's computer.