A chkrootkit is a toolkit that checks whether a rootkit is installed in the Linux operating system or not. Which of the following tools are contained in chkrootkit?
A. chkproc.c
B. chklastlog.c
C. chkdsk
D. ifpromisc.c
E. chkwtmp.c
Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?
A. Initial analysis, request for service, data collection, data reporting, data analysis
B. Request for service, initial analysis, data collection, data reporting, data analysis
C. Request for service, initial analysis, data collection, data analysis, data reporting
D. Initial analysis, request for service, data collection, data analysis, data reporting
You work as a Security Administrator for DataSoft Inc. The company has a Windows-based network. You have been assigned a project to strengthen the system security and also to provide a user friendly environment to the employees so that they can work efficiently. Which of the following concepts should you take into consideration to meet the goals of your project?
A. The security, functionality, and accessibility triangle.
B. The security, complexity, and accessibility triangle
C. The security, complexity, and functionality triangle
D. The security, functionality, and ease of use triangle.
You enter the following URL on your Web browser:
http://www.we-are-secure.com/scripts/..%co%af../..%co%
af../windows/system32/cmd.exe?/c+dir+c:\
What kind of attack are you performing?
A. Session hijacking
B. Directory traversal
C. URL obfuscating
D. Replay
Which of the following tools automates the password guessing in NetBIOS sessions and can also be used to perform a manual dictionary attack?
A. KerbCrack
B. Legion
C. THC Hydra
D. Pwdump
RRD Job World wants to upgrade its network. The company decides to implement a TCP/IP- based network. According to the case study, RRD Job World is concerned about security. Which of the following methods should the on-site employees use to communicate securely with the headquarters?
(Click the Exhibit button on the toolbar to see the case study.)
A. Windows NT Challenge/Response (NTLM) authentication
B. L2TP over IPSec
C. Basic (Clear Text) authentication using SSL
D. DNS security and group policies
Mark works as a Network Security Administrator for Umbrella Inc. The company has a Windows domain-based network. To provide security to the network, Mark plans to configure IDS. He wants to ensure that attackers are not able to modify or delete the system files. To determine such attacks, the IDS must be able to monitor the file structure of the system. Which of the following intrusion detection technologies can be used to accomplish the task?
A. Network IDS
B. Log File Monitor (LFM)
C. Host-based IDS
D. Systems Integrity Verifier (SIV)
Which two security components should you implement on the sales personnel portable computers to increase security?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose two.
A. Encrypting File System (EFS)
B. L2TP over IPSec
C. PPTP
D. Remote access policy
E. Remote Authentication Dial-In User Service (RADIUS)
Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?
Each correct answer represents a part of the solution. Choose three.
A. Configure the authentication type for the wireless LAN to Open system.
B. Disable SSID Broadcast and enable MAC address filtering on all wireless access points.
C. On each client computer, add the SSID for the wireless LAN as the preferred network.
D. Install a firewall software on each wireless access point.
E. Broadcast SSID to connect to the access point (AP).
F. Configure the authentication type for the wireless LAN to Shared Key.
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
A. Role Based Access Control (RBAC)
B. Mandatory Access Control (MAC)
C. Access Control List (ACL)
D. Discretionary Access Control (DAC)
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ECSS exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.