Free ECSS Exam Braindumps (page: 13)

Page 12 of 85

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

  1. Worm
  2. Adware
  3. Backdoor
  4. Spyware

Answer(s): C



Which of the following is a name, symbol, or slogan with which a product is identified?

  1. Copyright
  2. Trademark
  3. Trade secret
  4. Patent

Answer(s): B



John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Traceroute
  2. NeoTrace
  3. Cheops
  4. Ettercap

Answer(s): A,B,C



John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. Replay attack
  2. DoS attack
  3. ARP spoofing
  4. Rainbow attack

Answer(s): B






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts