In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?
A. Fraggle
B. Jolt
C. Teardrop
D. Ping of death
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:
·Information gathering ·Determining network range ·Identifying active machines ·Finding open ports and applications ·OS fingerprinting ·Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
A. Traceroute
B. NeoTrace
C. Cheops
D. Ettercap
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?
A. Replay attack
B. DoS attack
C. ARP spoofing
D. Rainbow attack
Which of the following statements are correct about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.
A. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the targetand the valid user cannot be active.
B. Session hijacking is an attack in which an attacker takes over the session, and the valid user'ssession is disconnected.
C. Session hijacking is an attack in which an attacker takes over the session, and the valid user'ssession is not disconnected.
D. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the targetbut the valid user can be active.
Which of the following can be used to perform session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
A. ARP spoofing
B. Cross-site scripting
C. Session fixation
D. Session sidejacking
In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?
A. Snooping
B. UDP port scanning
C. Port redirection
D. Firewalking
Which of the following is used to authenticate asymmetric keys?
A. Digital signature
B. MAC Address
C. Password
D. Demilitarized zone (DMZ)
Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?
A. Worm
B. Adware
C. Backdoor
D. Spyware
Which of the following is a name, symbol, or slogan with which a product is identified?
A. Copyright B. Trademark C. Trade secret D. Patent
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
A. Incident response policy
B. Chain of custody
C. Chain of evidence
D. Evidence access policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.