Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 171:

    Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

    · Network diagrams of the we-are-secure infrastructure · Source code of the security tools · IP addressing information of the we-are-secure network

    Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

    A. Graybox

    B. Blackbox

    C. Alpha testing

    D. Whitebox

  • Question 172:

    According to the case study, the departmental stores can dial in to distribution center computers to query their order status. Which protocol should they use to provide the highest level of security?

    (Click the Exhibit button on the toolbar to see the case study.)

    A. EAP

    B. MS-CHAP version 2

    C. MS-CHAP

    D. Basic Authentication

    E. PAP

  • Question 173:

    Which of the following DoS attacks attempts to block service or reduce activity on a host by sending ping requests directly to the victim?

    A. Teardrop attack

    B. Ping flood attack

    C. Land attack

    D. SYN flood attack

  • Question 174:

    Which of the following environmental variables represents the PID value of the last child process?

    A. $?

    B. $!

    C. $!!

    D. $$

  • Question 175:

    You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

    Each correct answer represents a complete solution. Choose two.

    A. MAC filtering the router

    B. Using WPA encryption

    C. Not broadcasting SSID

    D. Using WEP encryption

  • Question 176:

    Which of the following is a transport layer circuit-level proxy server?

    A. Bastion host

    B. UDP proxy

    C. SOCKS

    D. Forced proxy

  • Question 177:

    What is the size of Master Boot Record (MBR)?

    A. 512 bytes

    B. 256 bytes

    C. 1 KB

    D. 2 KB

  • Question 178:

    Which of the following commands is used to test a network connection?

    A. Popd

    B. Path

    C. Perfmon

    D. Ping

  • Question 179:

    Which of the following statements is true about a honeyfarm?

    A. It is a computer system used to attract hackers to identify them.

    B. It is a computer system that has no security.

    C. It is a centralized collection of honeypots.

    D. It is a firewall.

  • Question 180:

    Which of the following tools is used to verify Group Policy Object (GPO) settings?

    A. Psinfo

    B. Resplendent registrar

    C. Fport

    D. Pslist

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.