Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Mar 24, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 31:

    Which of the following software can be used to protect a computer system from external threats (viruses, worms, malware, or Trojans) and malicious attacks?

    Each correct answer represents a part of the solution. Choose all that apply.

    A. Employee monitoring software

    B. Burp Suite

    C. Antivirus

    D. Firewall

  • Question 32:

    Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

    A. Twofish

    B. Digital certificates

    C. Public key

    D. RSA

  • Question 33:

    You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

    A. Only users within the company.

    B. Only users with the correct WEP key.

    C. Only the administrator.

    D. Anyone can authenticate.

  • Question 34:

    Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

    A. One who can give a firsthand account of something seen, heard, or experienced.

    B. One with special knowledge of the subject about which he or she is testifying.

    C. One who observes an event.

    D. One who is not qualified as an expert witness.

  • Question 35:

    Which of the following tools provides a great solution for auditing and testing the recognition and response capabilities of the corporate security defenses?

    A. Traffic IQ Professional

    B. IPSentry

    C. Burp Suite

    D. F-Secure

  • Question 36:

    Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

    A. Stateful firewall

    B. Packet filter firewall

    C. Proxy-based firewall

    D. Endian firewall

  • Question 37:

    Which of the following layers of the OSI model provides non-repudiation services?

    A. The application layer

    B. The physical layer

    C. The data-link layer

    D. The presentation layer

  • Question 38:

    Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from various resources such as Apache log files, IIS logs, streaming servers, and some FTP servers. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use AWStats application. Which of the following statements are true about AWStats?

    Each correct answer represents a complete solution. Choose all that apply.

    A. It generates advanced Web, streaming, mail server statistics graphically.

    B. It can analyze log files server tools such as Apache log files, WebStar, IIS and other Web, proxy, and some ftp servers.

    C. It can work with all Web hosting providers, which allow Perl, CGI and log access.

    D. It works only as a CGI and shows all possible information contained in log.

  • Question 39:

    Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

    ·Network diagrams of the we-are-secure infrastructure ·Source code of the security tools · IP addressing information of the we-are-secure network

    Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

    A. Whitebox

    B. Blackbox

    C. Graybox

    D. Alpha testing

  • Question 40:

    You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user.

    You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you take to accomplish the task?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

    B. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

    C. Implement the open system authentication for the wireless network.

    D. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

    E. Implement the IEEE 802.1X authentication for the wireless network.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.