Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
· Network diagrams of the we-are-secure infrastructure · Source code of the security tools · IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
A. Graybox
B. Blackbox
C. Alpha testing
D. Whitebox
According to the case study, the departmental stores can dial in to distribution center computers to query their order status. Which protocol should they use to provide the highest level of security?
(Click the Exhibit button on the toolbar to see the case study.)
A. EAP
B. MS-CHAP version 2
C. MS-CHAP
D. Basic Authentication
E. PAP
Which of the following DoS attacks attempts to block service or reduce activity on a host by sending ping requests directly to the victim?
A. Teardrop attack
B. Ping flood attack
C. Land attack
D. SYN flood attack
Which of the following environmental variables represents the PID value of the last child process?
A. $?
B. $!
C. $!!
D. $$
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?
Each correct answer represents a complete solution. Choose two.
A. MAC filtering the router
B. Using WPA encryption
C. Not broadcasting SSID
D. Using WEP encryption
Which of the following is a transport layer circuit-level proxy server?
A. Bastion host
B. UDP proxy
C. SOCKS
D. Forced proxy
What is the size of Master Boot Record (MBR)?
A. 512 bytes
B. 256 bytes
C. 1 KB
D. 2 KB
Which of the following commands is used to test a network connection?
A. Popd
B. Path
C. Perfmon
D. Ping
Which of the following statements is true about a honeyfarm?
A. It is a computer system used to attract hackers to identify them.
B. It is a computer system that has no security.
C. It is a centralized collection of honeypots.
D. It is a firewall.
Which of the following tools is used to verify Group Policy Object (GPO) settings?
A. Psinfo
B. Resplendent registrar
C. Fport
D. Pslist
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.