Which of the following tools is used to catch someone installing a rootkit or running a packet sniffer?
A. chkrootkit
B. rkhunter
C. Blue Pill
D. OSSEC
You work as a Network Administrator for Maverick Inc. The company has a Linux-based network.
You are working on a Linux computer. You want to see the environment variables that are set on your computer. Which of the following commands will you use?
A. ls
B. echo $shell
C. rm
D. env
Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.
A. The secret key can encrypt a message, and anyone with the public key can decrypt it.
B. Data encrypted with the secret key can only be decrypted by another secret key.
C. The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.
D. Data encrypted by the public key can only be decrypted by the secret key.
You want to rename a file foo to the file bar and move the file bar to the /tmp folder. Which of the following commands will you use to accomplish the task?
A. mv bar /temp/foo
B. ren foo /tmp/bar
C. mv foo /tmp/bar
D. ren bar /tml/foo
Brutus is a password cracking tool that can be used to crack the following authentications:
·HTTP (Basic Authentication) ·HTTP (HTML Form/CGI) ·POP3 (Post Office Protocol v3) ·FTP (File Transfer Protocol) ·SMB (Server Message Block) ·Telnet
Which of the following attacks can be performed by Brutus for password cracking?
Each correct answer represents a complete solution. Choose all that apply.
A. Hybrid attack
B. Dictionary attack
C. Brute force attack
D. Man-in-the-middle attack
E. Replay attack
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?
A. Copyright law
B. Cyber law
C. Espionage law
D. Trademark law
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
A. WMA/TrojanDownloader.GetCodec
B. Win32/PSW.OnLineGames
C. Win32/Agent
D. Win32/Conflicker
Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?
A. Confidentiality
B. Authentication
C. Integrity
D. Non-repudiation
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?
A. Ethercap
B. Tripwire
C. IPChains
D. Hunt
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using dumpster diving to gather information about Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving come under?
A. Gaining access
B. Scanning
C. Maintaining access
D. Reconnaissance
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.