Free ECSS Exam Braindumps (page: 15)

Page 14 of 85

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.

  1. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.
  2. Attacker can use the Ping Flood DoS attack if WZC is used.
  3. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.
  4. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Answer(s): A,C



Which of the following uses public key cryptography to encrypt the contents of files?

  1. EFS
  2. DFS
  3. NTFS
  4. RFS

Answer(s): A



Which of the following softwares is used to perform constant monitoring of the network infrastructure?

  1. Logdog
  2. THCHydra
  3. IPSentry
  4. Cain

Answer(s): C



You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Implement the open system authentication for the wireless network.
  2. Implement the IEEE 802.1X authentication for the wireless network.
  3. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
  4. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.
  5. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

Answer(s): B,C,D






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts