PrepAway - Latest Free Exam Questions & Answers

Category: ECSS

Exam ECSS: EC-Council Certified Security Specialist

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the
security of www.we-are-secure.com. The company has provided the following information about
the infrastructure of its network:
· Network diagrams of the we-are-secure infrastructure
· Source code of the security tools
· IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its
network?

What is the IP address of the sender of this email?

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic
project. Now, you want to know the IP address of the sender so that you can analyze various
information such as the actual location, domain information, operating system being used, contact
information, etc. of the email sender with the help of various tools and resources. You also want to
check whether this email is fake or real. You know that analysis of email headers is a good starting
point in such cases. The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

Which of the following methods should the on-site employees use to communicate securely with the headquarters?

RRD Job World wants to upgrade its network. The company decides to implement a TCP/IPbased network. According to the case study, RRD Job World is concerned about security. Which
of the following methods should the on-site employees use to communicate securely with the
headquarters?
(Click the Exhibit button on the toolbar to see the case study.)


Page 19 of 28« First...10...1718192021...Last »