Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Mar 24, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 11:

    Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

    A. Microsoft Internet Security and Acceleration Server (ISA)

    B. Wingate

    C. SOCKS

    D. Sniffer

  • Question 12:

    Which of the following are the types of DOS commands?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Direct commands

    B. Internal commands

    C. Active commands

    D. External commands

  • Question 13:

    Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?

    Each correct answer represents a complete solution. Choose all that apply.

    A. It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches and routers etc.), syslog servers etc.

    B. It incorporates real-time reporting and real-time alerting.

    C. It comes only as a software package for user deployment.

    D. It is a software package for the statistical analysis and reporting of log files.

  • Question 14:

    Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

    A. E-mail Spam

    B. E-mail spoofing

    C. E-mail bombing

    D. E-mail Storm

  • Question 15:

    You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network.

    You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the

    network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed?

    Each correct answer represents a part of the solution. Choose all that apply.

    A. Buffer-overflow attack

    B. Social engineering

    C. Zero-day attack

    D. E-mail spoofing

  • Question 16:

    You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?

    A. Malware

    B. External threat

    C. Internal threat

    D. Zombie

  • Question 17:

    You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure. Which of the following tools can you use to accomplish the task?

    A. Wget

    B. WinSSLMiM

    C. Whisker

    D. httprint

  • Question 18:

    You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.

    You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file

    named file2 rather than being displayed on the screen.

    Which of the following tools should you use to accomplish the task?

    A. My_program 2>> file2

    B. My_program >> file2

    C. My_program 2> file2

    D. My_program > file2

  • Question 19:

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server:

    · Footprinting

    · Scanning

    Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

    Each correct answer represents a complete solution. Choose all that apply.

    A. PsFile

    B. UserInfo

    C. PsPasswd

    D. WinSSLMiM

  • Question 20:

    You work as a Network Administrator for Infonet Inc. The company's network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network. Where will you place the Web server?

    A. In a virtual private network (VPN)

    B. With the authentication server

    C. In a demilitarized zone (DMZ)

    D. With the database server

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.