Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Apr 01, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 241:

    Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

    A. Wingate

    B. SOCKS

    C. Sniffer

    D. Microsoft Internet Security and Acceleration Server (ISA)

  • Question 242:

    John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.

    Which of the following worms has attacked the computer?

    A. Ramen

    B. Nimda

    C. Code red

    D. LoveLetter

  • Question 243:

    John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He observes that the We-are-secure server is vulnerable to a special type of DoS attack and he makes the following suggestions to the security authority to protect the server from this DoS attack. The countermeasures against this type of DoS attack are as follows: Disabling IP-directed broadcasts at the We-are-secure router Configuring local computers so as not to respond to such ICMP packets that are configured to be sent to IP broadcast addresses Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure security network?

    A. Smurf attack

    B. Fraggle attack

    C. Teardrop attack

    D. Jolt attack

  • Question 244:

    Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

    A. Hardening

    B. Authentication

    C. Cryptography

    D. Sanitization

  • Question 245:

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server:

    Footprinting

    Scanning

    Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

    Each correct answer represents a complete solution. Choose all that apply.

    A. PsFile

    B. PsPasswd

    C. WinSSLMiM

    D. UserInfo

  • Question 246:

    Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

    A. Cyber law

    B. Copyright law

    C. Trademark law

    D. Espionage law

  • Question 247:

    Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from various resources such as Apache log files, IIS logs, streaming servers, and some FTP servers. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use AWStats application. Which of the following statements are true about AWStats?

    Each correct answer represents a complete solution. Choose all that apply.

    A. It can analyze log files server tools such as Apache log files, WebStar, IIS and other Web, proxy, and some ftp servers.

    B. It generates advanced Web, streaming, mail server statistics graphically.

    C. It can work with all Web hosting providers, which allow Perl, CGI and log access.

    D. It works only as a CGI and shows all possible information contained in log.

  • Question 248:

    Which of the following statements are true about routers?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

    B. Routers do not limit physical broadcast traffic.

    C. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

    D. Routers act as protocol translators and bind dissimilar networks.

  • Question 249:

    You work as a Network Administrator for Maverick Inc. The company has a Linux-based network. You are working on a Linux computer. You want to see the environment variables that are set on your computer. Which of the following commands will you use?

    A. echo $shell

    B. env

    C. ls

    D. rm

  • Question 250:

    What is the major difference between a worm and a Trojan horse?

    A. A worm is self replicating, while a Trojan horse is not.

    B. A Trojan horse is a malicious program, while a worm is an anti-virus software.

    C. A worm spreads via e-mail, while a Trojan horse does not.

    D. A worm is a form of malicious program, while a Trojan horse is a utility.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.