Free ECSS Exam Braindumps (page: 18)

Page 17 of 85

Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.
The __________ command is used to remove the print jobs that have been queued for printing by using a secure connection.

  1. lprm -E

Answer(s): A



Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

  1. Snort 2.1.0
  2. WIDS
  3. NFR security
  4. LogIDS 1.0

Answer(s): B



John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

  1. RSA
  2. Twofish
  3. Blowfish
  4. Diffie-Hellman

Answer(s): D



Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?
Each correct answer represents a complete solution. Choose all that apply.

  1. Zero-day attack
  2. Social engineering
  3. Rainbow attack
  4. Buffer-overflow attack
  5. Brute force attack
  6. Dictionary-based attack
  7. Denial-of-service (DoS) attack
  8. Password guessing

Answer(s): B,C,E,F,G,H






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts