Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Mar 24, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 291:

    Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.

    Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?

    Each correct answer represents a complete solution. Choose two.

    A. rwho -a

    B. lastb

    C. last

    D. pwd

  • Question 292:

    John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based

    systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.

    Which system is John using to track the malicious hackers?

    A. Honeypot

    B. Intrusion Detection System (IDS)

    C. Bastion host

    D. Honeytokens

  • Question 293:

    You work as a Sales Manager for NetPerfect Inc. The company has a Windows-based network. You have to often send confidential e-mails and make online payments and purchases. You want to protect transmitted information and also to increase the security of e-mail communications. Which of the following programs or services will you use to accomplish the task?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Anonymizer

    B. John the Ripper

    C. THC Hydra

    D. Pretty Good Privacy (PGP)

  • Question 294:

    The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.? (Click the Exhibit button on the toolbar to see the case study.)

    A. Preventing denial-of-service attacks.

    B. Providing two-factor authentication.

    C. Ensuring secure authentication.

    D. Protecting employee data on portable computers.

    E. Implementing Certificate services on Texas office.

    F. Preventing unauthorized network access.

    G. Providing secure communications between the overseas office and the headquarters.

    H. Providing secure communications between Washington and the headquarters office.

  • Question 295:

    According to the Internet Crime Report 2009, which of the following complaint categories is on the top?

    A. Identity theft

    B. Advanced fee fraud

    C. Non-delivered merchandise/payment

    D. FBI scams

  • Question 296:

    Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

    A. Steganography

    B. Public-key cryptography

    C. Encryption

    D. RSA algorithm

  • Question 297:

    Which of the following password cracking attacks does not use any software for cracking e-mail passwords? Each correct answer represents a complete solution. Choose all that apply.

    A. Brute force attack

    B. Shoulder surfing

    C. Social engineering

    D. Dictionary attack

  • Question 298:

    John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Samhain

    B. Tripwire

    C. Snort

    D. SARA

  • Question 299:

    You manage a Windows Server 2008 server named uCert1 in a domain named PassGuide.com.

    uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named

    PassGuideInternal.

    You want to ensure that all authentication traffic to the Web site is encrypted securely without the use of SSL. You disable Anonymous Authentication. What else should you do?

    A. Enable Windows Authentication and Forms Authentication.

    B. Enable Windows Authentication and Digest Authentication.

    C. Enable Basic Authentication and Windows Authentication.

    D. Enable Digest Authentication and Forms Authentication.

  • Question 300:

    What is the major difference between a worm and a Trojan horse?

    A. A worm is self replicating, while a Trojan horse is not.

    B. A worm is a form of malicious program, while a Trojan horse is a utility.

    C. A worm spreads via e-mail, while a Trojan horse does not.

    D. A Trojan horse is a malicious program, while a worm is an anti-virus software.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.