Free ECSS Exam Braindumps (page: 6)

Page 5 of 85

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?
Each correct answer represents a complete solution. Choose two.

  1. Using a protocol analyzer on your Laptop to monitor for risks.
  2. Using an IPSec enabled VPN for remote connectivity.
  3. Using portscanner like nmap in your network.
  4. Using personal firewall software on your Laptop.

Answer(s): B,D



Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

  1. I love you
  2. Melissa
  3. Tequila
  4. Brain

Answer(s): D



Which of the following needs to be documented to preserve evidences for presentation in court?

  1. Incident response policy
  2. Account lockout policy
  3. Separation of duties
  4. Chain of custody

Answer(s): D



Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme?
Each correct answer represents a complete solution. Choose all that apply.

  1. Kerberos requires continuous availability of a central server.
  2. Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
  3. Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
  4. Kerberos requires the clocks of the involved hosts to be synchronized.

Answer(s): A,C,D






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts