Free ECSS Exam Braindumps (page: 17)

Page 16 of 85

Jason, a cybercriminal, sells illegal articles on the Internet. Which of the following activities is Jason involved in?

  1. Cyberstalking
  2. Cyberterrorism
  3. Cybertrespass
  4. Internet pharmacies

Answer(s): D



In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  1. Bandwidth
  2. Delay
  3. Load
  4. Frequency

Answer(s): D



A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  1. Stunnel
  2. IPTables
  3. OpenSSH
  4. IPChains

Answer(s): B



Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

  1. Hardening
  2. Sanitization
  3. Authentication
  4. Cryptography

Answer(s): A






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts