PrepAway - Latest Free Exam Questions & Answers

Category: ECSS

Exam ECSS: EC-Council Certified Security Specialist

Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure security netwo

John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He observes that the We-are-secure server is vulnerable to a special
type of DoS attack and he makes the following suggestions to the security authority to protect the
server from this DoS attack. The countermeasures against this type of DoS attack are as follows:
Disabling IP-directed broadcasts at the We-are-secure router
Configuring local computers so as not to respond to such ICMP packets that are configured to be
sent to IP broadcast addresses
Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure
security network?

Which of the following tools can John use to conduct it?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
Footprinting
Scanning
Now he wants to conduct the enumeration phase.
Which of the following tools can John use to conduct it?
Each correct answer represents a complete solution. Choose all that apply.

which of the following laws can the employee be prosecuted?

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United
States. A project has been assigned to him to investigate a case of a disloyal employee who is
suspected of stealing design of the garments, which belongs to the company and selling those

garments of the same design under different brand name. Adam investigated that the company
does not have any policy related to the copy of design of the garments. He also investigated that
the trademark under which the employee is selling the garments is almost identical to the original
trademark of the company. On the grounds of which of the following laws can the employee be
prosecuted?

Which of the following techniques is Sam using?

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that

some confidential information is being leaked out by an employee of the company. Rick suspects
that someone is sending the information through email. He checks the emails sent by some
employees to other networks. Rick finds out that Sam, an employee of the Sales department, is
continuously sending text files that contain special symbols, graphics, and signs. Rick suspects
that Sam is using the Steganography technique to send data in a disguised form. Which of the
following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.

What is the IP address of the sender of this email?

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic
project. Now, you want to know the IP address of the sender so that you can analyze various
information such as the actual location, domain information, operating system being used, contact
information, etc. of the email sender with the help of various tools and resources. You also want to
check whether this email is fake or real. You know that analysis of email headers is a good starting
point in such cases. The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

which of the following attacks may she become vulnerable to?

Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN
Compensation Office with the following message:
If Maria replies to this mail, which of the following attacks may she become vulnerable to?
Dear Sir/Madam,
My name is Edgar Rena, the director of compensation here at the MN Compensation Office in
Chicago. We receive so many complaints about fraudulent activities that have been taking place in
your region for the past few years. Due to the high volume loss of money, the MN compensation
department has had an agreement with the appropriate authority to compensate each victim with a
sum of USD$500,000.00.
You were selected among the list of people to be paid this sum. To avoid any imperative mood by
intending scammers, your payment has been transmuted into an International bank draft which
can be cashed at any local bank in your country.
Please fill the below details and send it to our secretary for your compensation bank draft.
Full name: ______
Address: ________
Tel: ____________
Fill & Send to:
Dr. Michael Brown
MN Compensation Office, IL
Tel: +1-866-233-8434
Email: micbrown@live.com
Further instructions shall be given to you by our secretary as soon as you contact him. To avoid
losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to
our secretary.
Thanks and God bless.
Rate now:

Which of the following violations has been committed by Mola Co.?

Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa
and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new
company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like
Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the
following violations has been committed by Mola Co.?


Page 24 of 28« First...10...2223242526...Last »