Free ECSS Exam Braindumps (page: 16)

Page 15 of 85

Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.

  1. TCP session hijacking is when a hacker takes over a TCP session between two machines.
  2. It is used to slow the working of victim's network resources.
  3. Use of a long random number or string as the session key reduces session hijacking.
  4. It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

Answer(s): A,C,D



Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?
Each correct answer represents a complete solution. Choose all that apply.

  1. Phalanx2
  2. Adore
  3. Knark
  4. Beastkit

Answer(s): B,C



Who among the following are security experts who specialize in penetration testing and other testing methodologies to ensure that their company's information systems are secure?
Each correct answer represents a complete solution. Choose all that apply.

  1. Black hat hackers
  2. White hat hackers
  3. Script Kiddies
  4. Ethical hackers

Answer(s): B,D



You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

  1. Independent audit
  2. Operational audit
  3. Non-operational audit
  4. Dependent audit

Answer(s): A






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts