You work as a system administrator for BlueSkwer.com. You have just finished installing and configuring a new laptop for the CEO. The laptop has Windows 7 operating system. You have just deployed a secure wireless network in the company. Alex, the CEO, wants you to connect his laptop to the wireless network. What will you open to start the process of connecting to a wireless network?
A. Network and Sharing Center
B. Appearance and Personalization
C. System and Security
D. Devices and Printers
An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:
· Sniff data frames on a local area network.
· Modify the network traffic.
· Stop the network traffic frequently.
Which of the following techniques will the attacker use to accomplish the task?
A. ARP spoofing
B. IP spoofing
C. Eavesdropping
D. Session hijacking
Jason, a cybercriminal, sells illegal articles on the Internet. Which of the following activities is Jason involved in?
A. Cyberstalking
B. Cyberterrorism
C. Cybertrespass
D. Internet pharmacies
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?
A. RSA
B. Twofish
C. Blowfish
D. Diffie-Hellman
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam? Each correct answer represents a complete solution. Choose all that apply.
A. Forward a copy of the spam to the ISP to make the ISP conscious of the spam.
B. Send an email to the domain administrator responsible for the initiating IP address.
C. Close existing email account and open new email account.
D. Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.
You work as a computer operator for BlueWells Inc. The company has a Windows-based network.
You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about?
A. Spyware
B. Keylogger
C. Anti-Virus
D. Adware
You have been assigned the job of configuring wireless networks for a large company. The security of these networks is of great importance. One of the tools that you can use for applying security is Wireless Transport Layer Security (WTLS). What are the goals of using this tool?
Each correct answer represents a complete solution. Choose all that apply.
A. To provide authentication between the two end points
B. To provide data integrity
C. To provide privacy for the two end users
D. To provide data availability
On March 6, 2003, The SCO Group asserted that there are legal uncertainties regarding the use of the Linux operating system due to alleged violations of IBM's Unix licenses in the development of Linux code at IBM. What were the claims made by SCO on IBM regarding the use of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
A. Interference with contract
B. Breach of the GNU General Public License (GPL)
C. Lanham Act violation
D. Misappropriation of trade secrets
E. Breach of IBM software agreement
Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?
A. Gateway
B. LMHOSTS
C. Firewall
D. Bastion host
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:
C.\whisker.pl -h target_IP_address-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - == Host: target_IP_address= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true? Each correct answer represents a complete solution. Choose all that apply.
A. This vulnerability helps in a cross site scripting attack.
B. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.
C. With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.
D. The countermeasure to 'printenv' vulnerability is to remove the CGI script.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.