EC-Council ECSS Exam Questions
EC-Council Certified Security Specialist (ECSS) (Page 11 )

Updated On: 24-Feb-2026

Which of the following is a name, symbol, or slogan with which a product is identified?

  1. Copyright
  2. Trademark
  3. Trade secret
  4. Patent

Answer(s): B



John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Traceroute
  2. NeoTrace
  3. Cheops
  4. Ettercap

Answer(s): A,B,C



John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. Replay attack
  2. DoS attack
  3. ARP spoofing
  4. Rainbow attack

Answer(s): B



Which of the following statements are correct about spoofing and session hijacking?
Each correct answer represents a complete solution. Choose all that apply.

  1. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.
  2. Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is disconnected.
  3. Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is not disconnected.
  4. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.

Answer(s): C,D



In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

  1. Fraggle
  2. Jolt
  3. Teardrop
  4. Ping of death

Answer(s): D






Post your Comments and Discuss EC-Council ECSS exam dumps with other Community members:

Join the ECSS Discussion