ECSS Dumps ECSS Braindumps

ECSS Real Questions ECSS Practice Test ECSS Actual Questions


killexams.com EC-Council ECSS


EC-Council Certified Security Specialist


https://killexams.com/pass4sure/exam-detail/ECSS


QUESTION: 329

Which of the following forensic tool suite is developed for Linux operating system?


  1. MForensicsLab

  2. S.M.A.R.T.

  3. Wetstone

  4. ProDiscover


Answer: B


QUESTION: 330

Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?


  1. Containment

  2. Detection

  3. Preparation

  4. Eradication


Answer: A


QUESTION: 331

Which of the following is a transport layer circuit-level proxy server?


  1. Bastion host

  2. UDP proxy

  3. SOCKS

  4. Forced proxy


Answer: C


QUESTION: 332

What is the size of Master Boot Record (MBR)?


  1. 512 bytes

  2. 256 bytes

  3. 1 KB

  4. 2 KB


Answer: A


QUESTION: 333

Which of the following commands is used to test a network connection?


  1. Popd

  2. Path

  3. Perfmon

  4. Ping


Answer: D


QUESTION: 334

Which of the following statements is true about a honeyfarm?


  1. It is a computer system used to attract hackers to identify them.

  2. It is a computer system that has no security.

  3. It is a centralized collection of honeypots.

  4. It is a firewall.


Answer: C


QUESTION: 335

Which of the following tools is used to verify Group Policy Object (GPO) settings?


  1. Psinfo

  2. Resplendent registrar

  3. Fport

  4. Pslist


Answer: B


QUESTION: 336

Which of the following techniques is used to log network traffic?

  1. Cracking

  2. IP address spoofing

  3. Sniffing

  4. Tunneling


Answer: C


QUESTION: 337

Which of the following statements explains the dumpster diving hacking technique?


  1. This is an information gathering technique in which the attacker runs a software program to automatically call thousands of telephone numbers to find out a victim who has attached a modem to the Internet.

  2. This is an information gathering technique in which an attacker rummages through all the discarded waste-papers in the victim's trash.

  3. This is an information gathering technique in which the attacker calls the help center of the organization and asks someone to reset a password.

  4. This is an information gathering technique in which the attacker injects a Trojan in the victim's computer.


Answer: B