Free ECSS Exam Braindumps (page: 2)

Page 1 of 85

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.

  1. ICMP packets leaving the network should be allowed.
  2. An attacker should know the IP address of the last known gateway before the firewall.
  3. There should be a backdoor installed on the network.
  4. An attacker should know the IP address of a host located behind the firewall.

Answer(s): A,B,D



Which of the following security protocols are based on the 802.11i standard?
Each correct answer represents a complete solution. Choose all that apply.

  1. WEP
  2. WPA2
  3. WPA
  4. WEP2

Answer(s): B,C



Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

  1. Transport layer
  2. Presentation layer
  3. Data-link layer
  4. Network layer

Answer(s): B



You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

  1. Vulnerability scanning
  2. Manual penetration testing
  3. Automated penetration testing
  4. Code review

Answer(s): A






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts