Free ECSS Exam Braindumps (page: 9)

Page 8 of 85

What is the major difference between a worm and a Trojan horse?

  1. A worm is self replicating, while a Trojan horse is not.
  2. A worm is a form of malicious program, while a Trojan horse is a utility.
  3. A worm spreads via e-mail, while a Trojan horse does not.
  4. A Trojan horse is a malicious program, while a worm is an anti-virus software.

Answer(s): A



John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

  1. Sequence++ attack
  2. Phreaking
  3. Man-in-the-middle attack
  4. War dialing

Answer(s): B



You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Download folder
  2. History folder
  3. Temporary Internet Folder
  4. Cookies folder

Answer(s): B,C,D



John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Samhain
  2. Tripwire
  3. Snort
  4. SARA

Answer(s): A,C






Post your Comments and Discuss EC-Council ECSS exam with other Community members:

ECSS Discussions & Posts