EC-Council ECSS Exam Questions
EC-Council Certified Security Specialist (ECSS) (Page 13 )

Updated On: 24-Feb-2026

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Implement the open system authentication for the wireless network.
  2. Implement the IEEE 802.1X authentication for the wireless network.
  3. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
  4. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.
  5. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

Answer(s): B,C,D



Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.

  1. TCP session hijacking is when a hacker takes over a TCP session between two machines.
  2. It is used to slow the working of victim's network resources.
  3. Use of a long random number or string as the session key reduces session hijacking.
  4. It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

Answer(s): A,C,D



Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?
Each correct answer represents a complete solution. Choose all that apply.

  1. Phalanx2
  2. Adore
  3. Knark
  4. Beastkit

Answer(s): B,C



Who among the following are security experts who specialize in penetration testing and other testing methodologies to ensure that their company's information systems are secure?
Each correct answer represents a complete solution. Choose all that apply.

  1. Black hat hackers
  2. White hat hackers
  3. Script Kiddies
  4. Ethical hackers

Answer(s): B,D



You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

  1. Independent audit
  2. Operational audit
  3. Non-operational audit
  4. Dependent audit

Answer(s): A






Post your Comments and Discuss EC-Council ECSS exam dumps with other Community members:

Join the ECSS Discussion