Free ECSS Exam Braindumps (page: 19)

Page 18 of 85

Which of the following software helps in protecting the computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software?
Each correct answer represents a complete solution. Choose all that apply.

  1. BitDefender
  2. Windows Defender
  3. John the Ripper
  4. THC Hydra

Answer(s): A,B



A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures?
Each correct answer represents a complete solution. Choose all that apply.

  1. In order to digitally sign an electronic record, a person must use his/her public key.
  2. In order to verify a digital signature, the signer's private key must be used.
  3. In order to verify a digital signature, the signer's public key must be used.
  4. In order to digitally sign an electronic record, a person must use his/her private key.

Answer(s): C,D



Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.

  1. FINALeMAIL
  2. eMailTrackerPro
  3. EventCombMT
  4. R-mail

Answer(s): A,D



Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

  1. Eradication phase
  2. Preparation phase
  3. Recovery phase
  4. Identification phase
  5. Containment phase

Answer(s): B






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts