EC-Council Certified Security Specialist Practice Test 3
Google Ads:
What is the major difference between a worm and a Trojan horse?
Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two. A. S/MIME B. IPSec C. PGP D. TLS
Which of the following are the two primary U.S. laws that address cyber crime?
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?
Advertisement
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
Which of the following is provided by Digital signatures?
You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?
You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?
Advertisement
Which of the following networks relies on the tunneling protocol?
Which of the following processes is used by hackers to find information about the target system?
What is the critical evaluation of the most relevant information on a given topic known as?
Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?
Advertisement
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He observes that the We-are-secure server is vulnerable to a special type of DoS attack and he makes the following suggestions to the security authority to protect the server from this DoS attack. The countermeasures against this type of DoS attack are as follows: l Disabling IP-directed broadcasts at the We-are-secure router l Configuring local computers so as not to respond to such ICMP packets that are configured to be sent to IP broadcast addresses Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure security network?
Jason works as a System Administrator for Passguide Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Reg.exe B. Resplendent registrar C. EventCombMT D. Regedit.exe
Which of the following is a valid IP address for class B Networks?
Which of the following is an example of a social engineering attack?
Advertisement
You work as a Network Administrator for Maverick Inc. The company has a Linux-based network. You are working on a Linux computer. You want to see the environment variables that are set on your computer. Which of the following commands will you use?
Which of the following commands is used in Mac OS X to exit Open Firmware and to continue the booting process?
You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Web server logs B. Event logs C. Program logs D. System logs
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Click Next Button or HERE for more Questions