Free ECSS Exam Braindumps (page: 11)

Page 10 of 85

According to the Internet Crime Report 2009, which of the following complaint categories is on the top?

  1. Identity theft
  2. Advanced fee fraud
  3. Non-delivered merchandise/payment
  4. FBI scams

Answer(s): D



Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

  1. Steganography
  2. Public-key cryptography
  3. Encryption
  4. RSA algorithm

Answer(s): A



Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

  1. Incident response policy
  2. Chain of custody
  3. Chain of evidence
  4. Evidence access policy

Answer(s): B



Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.

  1. rwho -a
  2. lastb
  3. last
  4. pwd

Answer(s): B,C






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts