Free ECSS Exam Braindumps (page: 12)

Page 11 of 85

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based
systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?

  1. Honeypot
  2. Intrusion Detection System (IDS)
  3. Bastion host
  4. Honeytokens

Answer(s): A



Which of the following can be used to perform session hijacking?
Each correct answer represents a complete solution. Choose all that apply.

  1. ARP spoofing
  2. Cross-site scripting
  3. Session fixation
  4. Session sidejacking

Answer(s): B,C,D



In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

  1. Snooping
  2. UDP port scanning
  3. Port redirection
  4. Firewalking

Answer(s): C



Which of the following is used to authenticate asymmetric keys?

  1. Digital signature
  2. MAC Address
  3. Password
  4. Demilitarized zone (DMZ)

Answer(s): A






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts