Latest ECP-206 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : ECP-206
Exam Name : Certified Associate - IP Networking
Vendor Name : "Ericsson"







ECSS Dumps ECSS Braindumps

ECSS Real Questions ECSS Practice Test ECSS Actual Questions


killexams.com EC-Council ECSS


EC-Council Certified Security Specialist


https://killexams.com/pass4sure/exam-detail/ECSS



Question: 329

Which of the following forensic tool suite is developed for Linux operating system?


  1. MForensicsLab

  2. S.M.A.R.T.

  3. Wetstone

  4. ProDiscover




Answer: B



Question: 330

Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?


  1. Containment

  2. Detection

  3. Preparation

  4. Eradication




Answer: A



Question: 331

Which of the following is a transport layer circuit-level proxy server?


  1. Bastion host

  2. UDP proxy

  3. SOCKS

  4. Forced proxy




Answer: C



Question: 332

What is the size of Master Boot Record (MBR)?


  1. 512 bytes

  2. 256 bytes

  3. 1 KB

  4. 2 KB




Answer: A



Question: 333

Which of the following commands is used to test a network connection?


  1. Popd

  2. Path

  3. Perfmon

  4. Ping




Answer: D



Question: 334

Which of the following statements is true about a honeyfarm?


  1. It is a computer system used to attract hackers to identify them.

  2. It is a computer system that has no security.

  3. It is a centralized collection of honeypots.

  4. It is a firewall.




Answer: C



Question: 335

Which of the following tools is used to verify Group Policy Object (GPO) settings?


  1. Psinfo

  2. Resplendent registrar

  3. Fport

  4. Pslist




Answer: B



Question: 336

Which of the following techniques is used to log network traffic?

  1. Cracking

  2. IP address spoofing

  3. Sniffing

  4. Tunneling




Answer: C



Question: 337

Which of the following statements explains the dumpster diving hacking technique?


  1. This is an information gathering technique in which the attacker runs a software program to automatically call thousands of telephone numbers to find out a victim who has attached a modem to the Internet.

  2. This is an information gathering technique in which an attacker rummages through all the discarded waste-papers in the victim's trash.

  3. This is an information gathering technique in which the attacker calls the help center of the organization and asks someone to reset a password.

  4. This is an information gathering technique in which the attacker injects a Trojan in the victim's computer.




Answer: B