Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?
A. Endian firewall
B. Stateful firewall
C. Packet filter firewall
D. Proxy-based firewall
In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?
A. Firewalking
B. Snooping
C. Port redirection
D. UDP port scanning
Which of the following proxy servers is used to retrieve web pages?
A. FTP proxy server
B. NAT proxy server
C. HTTP proxy server
D. Socks proxy server
Which of the following is used over the Internet for better security?
A. SOCKS
B. IMAP Server
C. Wingate
D. S-HTTP
Which of the following programs is used in Linux to modify boot settings?
A. Apache
B. Conky
C. Nagios
D. LILO
An Anti-Virus software is used to prevent, detect, and remove malware from a system, including computer viruses, worms, and Trojan horses. Which of the following companies are the providers of Anti-virus softwares?
Each correct answer represents a complete solution. Choose all that apply.
A. Kaspersky Lab
B. Symantec Corporation
C. AVG Technologies
D. McAfee Inc.
E. F-Secure Corporation
Which of the following malicious software implements itself on the kernel level of any operating system and is hard to detect and delete?
A. Worm
B. Adware
C. Spyware
D. Rootkit
What are the two common parts of a Remote Access Trojan (RAT)?
A. A client component and a server component
B. The outbound port and the inbound port
C. The ARP cache and the CAM table
D. The payload and the wrapper
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
A. Lead investigator
B. Legal representative
C. Information security representative
D. Technical representative
What does CSIRT stand for?
A. Computer Security Incident Response Team
B. Chief Security Incident Response Team
C. Computer Security Information Response Team
D. Chief Security Information Response Team
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.