Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?
Each correct answer represents a complete solution. Choose all that apply.
A. Zero-day attack
B. Social engineering
C. Rainbow attack
D. Buffer-overflow attack
E. Brute force attack
F. Dictionary-based attack
G. Denial-of-service (DoS) attack
H. Password guessing
Which of the following software helps in protecting the computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software?
Each correct answer represents a complete solution. Choose all that apply.
A. BitDefender
B. Windows Defender
C. John the Ripper
D. THC Hydra
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures?
Each correct answer represents a complete solution. Choose all that apply.
A. In order to digitally sign an electronic record, a person must use his/her public key.
B. In order to verify a digital signature, the signer's private key must be used.
C. In order to verify a digital signature, the signer's public key must be used.
D. In order to digitally sign an electronic record, a person must use his/her private key.
Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. FINALeMAIL
B. eMailTrackerPro
C. EventCombMT
D. R-mail
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
A. Eradication phase
B. Preparation phase
C. Recovery phase
D. Identification phase
E. Containment phase
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
A. Hardening
B. Sanitization
C. Authentication
D. Cryptography
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?
A. Snort 2.1.0
B. WIDS
C. NFR security
D. LogIDS 1.0
Which of the following types of authentication messages are supported by the TACACS+ protocol by default?
Each correct answer represents a complete solution. Choose all that apply.
A. Telnet
B. Kerberos
C. Username/password
D. ARP
E. PAP
F. CHAP
G. SLIP
Which of the following malware spread through the Internet and caused a large DoS attack in 1988?
A. Morris worm
B. SQL slammer worm
C. Klez worm
D. LoveLetter worm
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
A. Bandwidth
B. Delay
C. Load
D. Frequency
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.