Net Spy Pro is the latest network monitoring software. This program helps a user to know what the others are doing on their computers. What are the features of this program?
Each correct answer represents a complete solution. Choose all that apply.
A. PC administration
B. Remote control
C. Activity filtering
D. Activity monitoring
Which of the following commands is used to make traceroute wait 5 seconds for a response to a packet?
A. traceroute -r
B. traceroute -w
C. traceroute -q
D. traceroute -T
Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?
A. The Equal Credit Opportunity Act (ECOA)
B. The Privacy Act
C. The Fair Credit Reporting Act (FCRA)
D. The Electronic Communications Privacy Act
Which of the following statements are true about firewalking?
Each correct answer represents a complete solution. Choose all that apply.
A. Firewalking works on the UDP packets.
B. A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.
C. To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.
D. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.
You are using the dsniff tool to intercept communications between two entities and establish credentials with both sides of the connections. These entities do not notice that you were retrieving the information between these two. Which of the following attacks are you performing?
A. Session hijacking
B. DoS
C. ARP poisoning
D. Man-in-the-middle
Which of the following tools will you use to prevent from session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
A. OpenSSH
B. Telnet
C. Rlogin
D. SSL
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?
A. E-mail bombing
B. E-mail spoofing
C. E-mail Spam
D. E-mail Storm
Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?
A. Snort
B. NetStumbler
C. AiroPeek
D. Cain
Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.
A. Anti-x
B. Image hide
C. Stegbreak
D. Snow.exe
Which of the following statements is true about IP spoofing?
A. It is the process used by hackers for disguising the source IP address.
B. It is the process used by hackers to access the target system.
C. It is the process used by hackers to find the IP address of a target system.
D. It is a process used by hackers to generate new IP addresses.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.