Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 151:

    Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

    A. Encryption

    B. Steganography

    C. RSA algorithm

    D. Public-key cryptography

  • Question 152:

    Which of the following statements are true about Public-key cryptography?

    Each correct answer represents a complete solution. Choose two.

    A. Data encrypted with the secret key can only be decrypted by another secret key.

    B. The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

    C. Data encrypted by the public key can only be decrypted by the secret key.

    D. The secret key can encrypt a message, and anyone with the public key can decrypt it.

  • Question 153:

    Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

    A. Digital certificates

    B. Twofish

    C. Public key

    D. RSA

  • Question 154:

    Which of the following viruses/worms uses the buffer overflow attack?

    A. Code red worm

    B. Nimda virus

    C. Chernobyl (CIH) virus

    D. Klez worm

  • Question 155:

    TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

    A. Red Hat

    B. Windows

    C. Knoppix

    D. Solaris

  • Question 156:

    Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice?

    Each correct answer represents a part of the solution. Choose all that apply.

    A. Call

    B. Look

    C. Stop

    D. Identify

  • Question 157:

    You work as a Network Administrator for Infonet Inc. The company's network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network. Where will you place the Web server?

    A. With the authentication server

    B. In a demilitarized zone (DMZ)

    C. With the database server

    D. In a virtual private network (VPN)

  • Question 158:

    Which of the following DoS attacks attempts to block service or reduce activity on a host by sending ping requests directly to the victim?

    A. Land attack

    B. Ping flood attack

    C. SYN flood attack

    D. Teardrop attack

  • Question 159:

    You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

    A. Change the entire security policy.

    B. Start the Incident handling process.

    C. Switch to a new network infrastructure.

    D. Perform an IT audit.

  • Question 160:

    You work as a Network Administrator for Infonet Inc. The company's office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?

    A. Service Set Identifier

    B. Internet service provider's DNS server address

    C. Demilitarized zone

    D. I/O address

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.