Exam Details

  • Exam Code
    :ECSS
  • Exam Name
    :EC-Council Certified Security Specialist (ECSS) v10
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :337 Q&As
  • Last Updated
    :Mar 24, 2025

EC-COUNCIL EC-COUNCIL Certifications ECSS Questions & Answers

  • Question 41:

    Which of the following statements are TRUE about Demilitarized zone (DMZ)?

    Each correct answer represents a complete solution. Choose all that apply.

    A. The purpose of a DMZ is to add an additional layer of security to the Local Area Network of an organization.

    B. In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.

    C. Hosts in the DMZ have full connectivity to specific hosts in the internal network.

    D. Demilitarized zone is a physical or logical sub-network that contains and exposes external services of an organization to a larger un-trusted network.

  • Question 42:

    In which of the following complaint types does a fraudulent transaction take place?

    A. Overpayment Fraud

    B. FBI scams

    C. Auction fraud

    D. Computer damage

  • Question 43:

    Which of the following malicious software is used by several advertising websites for downloading and displaying advertisements in the Web browser without user permission?

    A. Worm

    B. Blended threat

    C. Adware

    D. Trojan horse

  • Question 44:

    Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice?

    Each correct answer represents a part of the solution. Choose all that apply.

    A. Call

    B. Look

    C. Identify

    D. Stop

  • Question 45:

    Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

    A. LILO

    B. GRUB

    C. NT Loader

    D. BootX

  • Question 46:

    An Anti-Virus software is used to prevent, detect, and remove malware from a system, including computer viruses, worms, and Trojan horses. Which of the following companies are the providers of Anti-virus softwares?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Symantec Corporation

    B. F-Secure Corporation

    C. AVG Technologies

    D. Kaspersky Lab

    E. McAfee Inc.

  • Question 47:

    Burp Suite is a Java application for attacking web applications. This tool includes a proxy server, a spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?

    A. Repeater

    B. Spider

    C. Intruder

    D. Proxy Server

  • Question 48:

    Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.

    The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

    A. Jason did not perform a vulnerability assessment.

    B. Jason did not perform port scanning.

    C. Jason did not perform foot printing.

    D. Jason did not perform OS fingerprinting.

    E. Jason did not perform covering tracks.

  • Question 49:

    Which of the following components are usually found in an Intrusion detection system (IDS)?

    Each correct answer represents a complete solution. Choose two.

    A. Modem

    B. Console

    C. Sensor

    D. Gateway

    E. Firewall

  • Question 50:

    Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

    A. Production honeypot

    B. Research honeypot

    C. Honeynet

    D. Honeyfarm

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.