Free ECSS Exam Braindumps (page: 4)

Page 3 of 85

Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Each correct answer represents a complete solution. Choose all that apply.

  1. Denial-of-Service (DoS) attack
  2. E-mail spoofing
  3. Port scan attack
  4. Shoulder surfing

Answer(s): B,D



Which of the following statements best describes a certification authority?

  1. A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.
  2. A certification authority is an entity that issues digital certificates for use by other parties.
  3. A certification authority is a technique to authenticate digital documents by using computer cryptography.
  4. A certification authority is a type of encryption that uses a single key to encrypt and decryp t data.

Answer(s): B



You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?
Each correct answer represents a complete solution. Choose two.

  1. Using WEP encryption
  2. Using WPA encryption
  3. Not broadcasting SSID
  4. MAC filtering the router

Answer(s): A,B



Linux traffic monitoring tools are used to monitor and quickly detect faults in the network or a system. Which of the following tools are used to monitor traffic of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.

  1. PsExec
  2. IPTraf
  3. MRTG
  4. PsLogList
  5. Ntop

Answer(s): B,C,E






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts