EC-Council ECSS Exam Questions
EC-Council Certified Security Specialist (ECSS) (Page 8 )

Updated On: 21-Feb-2026

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Download folder
  2. History folder
  3. Temporary Internet Folder
  4. Cookies folder

Answer(s): B,C,D



John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Samhain
  2. Tripwire
  3. Snort
  4. SARA

Answer(s): A,C



You manage a Windows Server 2008 server named uCert1 in a domain named PassGuide.com.
uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named
PassGuideInternal.
You want to ensure that all authentication traffic to the Web site is encrypted securely without the use of SSL. You disable Anonymous Authentication. What else should you do?

  1. Enable Windows Authentication and Forms Authentication.
  2. Enable Windows Authentication and Digest Authentication.
  3. Enable Basic Authentication and Windows Authentication.
  4. Enable Digest Authentication and Forms Authentication.

Answer(s): B



Which of the following password cracking attacks does not use any software for cracking e-mail passwords?
Each correct answer represents a complete solution. Choose all that apply.

  1. Brute force attack
  2. Shoulder surfing
  3. Social engineering
  4. Dictionary attack

Answer(s): B,C



You work as a Sales Manager for NetPerfect Inc. The company has a Windows-based network. You have to often send confidential e-mails and make online payments and purchases. You want to protect transmitted information and also to increase the security of e-mail communications. Which of the following programs or services will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Anonymizer
  2. John the Ripper
  3. THC Hydra
  4. Pretty Good Privacy (PGP)

Answer(s): A,D






Post your Comments and Discuss EC-Council ECSS exam dumps with other Community members:

Join the ECSS Discussion