Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 181:

    Which of the following techniques is used to log network traffic?

    A. Cracking

    B. IP address spoofing

    C. Sniffing

    D. Tunneling

  • Question 182:

    Which of the following statements explains the dumpster diving hacking technique?

    A. This is an information gathering technique in which the attacker runs a software program to automatically call thousands of telephone numbers to find out a victim who has attached a modem to the Internet.

    B. This is an information gathering technique in which an attacker rummages through all the discarded waste-papers in the victim's trash.

    C. This is an information gathering technique in which the attacker calls the help center of the organization and asks someone to reset a password.

    D. This is an information gathering technique in which the attacker injects a Trojan in the victim's computer.

  • Question 183:

    Which of the following tools is used to clear the event log?

    A. Elsave

    B. Auditpol

    C. John the Ripper

    D. AirSnort

  • Question 184:

    Which of the following law does not protect intellectual property?

    A. Murphy's law

    B. Trademark

    C. Patent law

    D. Copyright

  • Question 185:

    Which of the following forensic tool suite is developed for Linux operating system?

    A. MForensicsLab

    B. S.M.A.R.T.

    C. Wetstone

    D. ProDiscover

  • Question 186:

    Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?

    A. Containment

    B. Detection

    C. Preparation

    D. Eradication

  • Question 187:

    Which of the following programs is used to monitor the keystrokes that a user types on a specific computer's keyboard?

    A. Keylogger

    B. Brutus

    C. Ettercap

    D. THC-Hydra

  • Question 188:

    Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

    A. Identification phase

    B. Preparation phase

    C. Eradication phase

    D. Differential phase

  • Question 189:

    Which of the following attacks is used to hack simple alphabetical passwords?

    A. Dictionary-based attack

    B. Black hat attack

    C. Sniffing

    D. Man-in-the-middle attack

  • Question 190:

    Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?

    A. Rainbow attack

    B. Dictionary attack

    C. Brute force attack

    D. SQL injection attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.