EC-Council ECSS Exam Questions
EC-Council Certified Security Specialist (ECSS) (Page 4 )

Updated On: 21-Feb-2026

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?
Each correct answer represents a complete solution. Choose two.

  1. Using WEP encryption
  2. Using WPA encryption
  3. Not broadcasting SSID
  4. MAC filtering the router

Answer(s): A,B



Linux traffic monitoring tools are used to monitor and quickly detect faults in the network or a system. Which of the following tools are used to monitor traffic of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.

  1. PsExec
  2. IPTraf
  3. MRTG
  4. PsLogList
  5. Ntop

Answer(s): B,C,E



John works as an Office Assistant in DataSoft Inc. He has received an e-mail from duesoft_lotterygroup@us.com with the following message:
The DueSoft Lottery Incorporation
This is to inform you that you have just won a prize of $7,500.00 for this year's Annual Lottery promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect active online e-mails and select five people every year as our winners through an electronic balloting machine. Please reply within three days of receiving this e-mail with your full details like Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your prize.
If John replies to this e-mail, which of the following attacks may he become vulnerable to?

  1. Salami attack
  2. Man-in-the-Middle attack
  3. Phishing attack
  4. DoS attack

Answer(s): C



Fill in the blank with the appropriate word ___is software that is a subcategory of malware and refers to unwanted software that performs malicious actions on a user's computer. Some its examples are Trojan, adware, and spyware.

  1. Crimeware

Answer(s): A



John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

  1. AirSnort
  2. Kismet
  3. PsPasswd
  4. Cain

Answer(s): A






Post your Comments and Discuss EC-Council ECSS exam dumps with other Community members:

Join the ECSS Discussion