Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the following violations has been committed by Mola Co.?
A. Trademark infringement
B. Plagiarism
C. Patent law
D. Copyright infringement
Which of the following Trojans is used by attackers to modify the Web browser settings?
A. WMA/TrojanDownloader.GetCodec
B. Win32/FlyStudio
C. Trojan.Lodear
D. Win32/Pacex.Gen
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?
Each correct answer represents a complete solution. Choose all that apply.
A. TIS authentication
B. Password-based authentication
C. Kerberos authentication
D. Rhosts (rsh-style) authentication
John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windowsbased network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task?
A. nslookup
B. tracert and pathping
C. netstat
D. nbtstat
Which of the following attacks is used by attackers to access a company's internal network through its remote access system?
A. Trojan horse
B. Land attack
C. War dialer
D. Denial-of-Service (DoS) attack
Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?
A. Firewalking
B. Replay
C. Session fixation
D. Cross site scripting
According to the Sophos Security Threat Report 2009, which country amongst the following tops in producing spam (unwanted e-mails)?
A. Russia
B. United States
C. China
D. Turkey
Which of the following viruses/worms uses the buffer overflow attack?
A. Nimda virus
B. Code red worm
C. Chernobyl (CIH) virus
D. Klez worm
Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?
A. Web proxy server
B. Caching proxy server
C. Open proxy server
D. Forced proxy server
You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?
A. Change the entire security policy.
B. Switch to a new network infrastructure.
C. Start the Incident handling process.
D. Perform an IT audit.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.