Free ECSS Exam Braindumps (page: 7)

Page 6 of 85

Which of the following is used in asymmetric encryption?

  1. Public key and user key
  2. SSL
  3. Public key and private key
  4. NTFS

Answer(s): C



Sam, a malicious hacker, targets the electric power grid of Umbrella Inc. and gains access to the electronic control systems. Which of the following types of cybercrime has Sam performed?

  1. Cyber defamation
  2. Cybertrespass
  3. Cyberterrorism
  4. Cybertheft

Answer(s): C



Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN Compensation Office with the following message:

Dear Sir/Madam,
My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00.
You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country.
Please fill the below details and send it to our secretary for your compensation bank draft.

Full name: ______
Address: ________
Tel: ____________

Fill & Send to:

Dr. Michael Brown
MN Compensation Office, IL
Tel: +1-866-233-8434
Email: micbrown@live.com

Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary.

Thanks and God bless.

If Maria replies to this mail, which of the following attacks may she become vulnerable to?

  1. Phishing attack
  2. SYN attack
  3. CookieMonster attack
  4. Mail bombing

Answer(s): A



Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.

Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.

  1. The attacker can exploit any protocol used to go into the internal network or intranet of the company.
  2. The attacker can gain access to the Web server in a DMZ and exploit the database.
  3. The attacker can perform a Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.
  4. The attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

Answer(s): A,B,C






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts