Which of the following laws was formed by the legislative branch of the United States government?
A. Business law
B. Statutory law
C. Study law
D. Administrative law
Which of the following protocols of the TCP/IP suite is used in the application layer of the OSI model?
A. DCAP
B. OSPF
C. ARP
D. Telnet
Which of the following malicious codes is used by a hacker to get control over the system files of a victim?
A. Worm
B. Multipartite virus
C. Macro virus
D. Trojan
Which of the following processes is used by hackers to find information about the target system?
A. Banner grabbing
B. Cracking
C. Covering tracks
D. Foot printing
Which of the following is provided by Digital signatures?
A. Security and Integrity.
B. Integrity and Validation.
C. Authentication and Identification.
D. Identification and Validation.
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
A. Brain
B. Stoner
C. Sircam
D. Code Red
Which of the following is an example of a worm used in the Linux operating system?
A. Ramen
B. Sircam
C. Love Bug
D. Melissa
Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.
A. There should be a backdoor installed on the network.
B. An attacker should know the IP address of a host located behind the firewall.
C. An attacker should know the IP address of the last known gateway before the firewall.
D. ICMP packets leaving the network should be allowed.
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
A. Jason did not perform a vulnerability assessment.
B. Jason did not perform port scanning.
C. Jason did not perform covering tracks.
D. Jason did not perform foot printing.
E. Jason did not perform OS fingerprinting.
Sam, a bank employee, develops a program and uploads it to the bank's server. He deducts $1 a month from the account of every customer using the program. Probably no account holder will notice this type of illegal debit, but Sam will make a good amount of money every month. Which of the following types of cybercrime is Sam performing?
A. Salami attack
B. Web jacking
C. Web defacement
D. Data diddling
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.