EC-Council ECSS Exam Questions
EC-Council Certified Security Specialist (ECSS) (Page 12 )

Updated On: 24-Feb-2026

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?

  1. Code red
  2. Ramen
  3. LoveLetter
  4. Nimda

Answer(s): B



Which two technologies should research groups use for secure VPN access while traveling?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose two.

  1. SSL
  2. Kerberos authentication
  3. PPTP
  4. Smart cards
  5. Encrypting File System (EFS)

Answer(s): C,D



Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.

  1. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.
  2. Attacker can use the Ping Flood DoS attack if WZC is used.
  3. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.
  4. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Answer(s): A,C



Which of the following uses public key cryptography to encrypt the contents of files?

  1. EFS
  2. DFS
  3. NTFS
  4. RFS

Answer(s): A



Which of the following softwares is used to perform constant monitoring of the network infrastructure?

  1. Logdog
  2. THCHydra
  3. IPSentry
  4. Cain

Answer(s): C






Post your Comments and Discuss EC-Council ECSS exam dumps with other Community members:

Join the ECSS Discussion