Which of the following techniques is used to log network traffic?
A. Cracking
B. IP address spoofing
C. Sniffing
D. Tunneling
Which of the following statements explains the dumpster diving hacking technique?
A. This is an information gathering technique in which the attacker runs a software program to automatically call thousands of telephone numbers to find out a victim who has attached a modem to the Internet.
B. This is an information gathering technique in which an attacker rummages through all the discarded waste-papers in the victim's trash.
C. This is an information gathering technique in which the attacker calls the help center of the organization and asks someone to reset a password.
D. This is an information gathering technique in which the attacker injects a Trojan in the victim's computer.
Which of the following tools is used to clear the event log?
A. Elsave
B. Auditpol
C. John the Ripper
D. AirSnort
Which of the following law does not protect intellectual property?
A. Murphy's law
B. Trademark
C. Patent law
D. Copyright
Which of the following forensic tool suite is developed for Linux operating system?
A. MForensicsLab
B. S.M.A.R.T.
C. Wetstone
D. ProDiscover
Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?
A. Containment
B. Detection
C. Preparation
D. Eradication
Which of the following programs is used to monitor the keystrokes that a user types on a specific computer's keyboard?
A. Keylogger
B. Brutus
C. Ettercap
D. THC-Hydra
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
A. Identification phase
B. Preparation phase
C. Eradication phase
D. Differential phase
Which of the following attacks is used to hack simple alphabetical passwords?
A. Dictionary-based attack
B. Black hat attack
C. Sniffing
D. Man-in-the-middle attack
Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?
A. Rainbow attack
B. Dictionary attack
C. Brute force attack
D. SQL injection attack
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.