PrepAway - Latest Free Exam Questions & Answers

Category: ECSS

Exam ECSS: EC-Council Certified Security Specialist

which of the following attacks may she become vulnerable to?

Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN
Compensation Office with the following message:
Dear Sir/Madam,
My name is Edgar Rena, the director of compensation here at the MN Compensation Office in
Chicago. We receive so many complaints about fraudulent activities that have been taking place in

your region for the past few years. Due to the high volume loss of money, the MN compensation
department has had an agreement with the appropriate authority to compensate each victim with a
sum of USD$500,000.00.
You were selected among the list of people to be paid this sum. To avoid any imperative mood by
intending scammers, your payment has been transmuted into an International bank draft which
can be cashed at any local bank in your country.
Please fill the below details and send it to our secretary for your compensation bank draft.
Full name: ______
Address: ________
Tel: ____________
Fill & Send to:
Dr. Michael Brown
MN Compensation Office, IL
Tel: +1-866-233-8434
Email: micbrown@live.com
Further instructions shall be given to you by our secretary as soon as you contact him. To avoid
losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to
our secretary.
Thanks and God bless.
If Maria replies to this mail, which of the following attacks may she become vulnerable to?

Which of the following security threats may occur if DMZ protocol attacks are performed?

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

Which of the following utilities can Jason use to accomplish the task?

Jason works as a System Administrator for Passguide Inc. The company has a Windows-based
network. Sam, an employee of the company, accidentally changes some of the applications and
system settings. He complains to Jason that his system is not working properly. To troubleshoot
the problem, Jason diagnoses the internals of his computer and observes that some changes
have been made in Sam’s computer registry. To rectify the issue, Jason has to restore the
registry.
Which of the following utilities can Jason use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following Steganography attacks is Victor using?

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to
test an image, in which some secret information is hidden, using Steganography. Victor performs
the following techniques to accomplish the task:
1. Smoothening and decreasing contrast by averaging the pixels of the area where significant
color transitions occurs.
2. Reducing noise by adjusting color and averaging pixel value.
3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?


Page 3 of 2812345...1020...Last »