EC-Council Certified Security Specialist (ECSS) Quiz Questions and Answers

Which of the following is a name, symbol, or slogan with which a product is identified?

Answer :
  • Trademark

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Answer :
  • Patent

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

Answer :
  • Vulnerability scanning

Which of the following types of attacks cannot be prevented by technical measures only?

Answer :
  • Social engineering

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

Answer :
  • Configuration of VPN access

Which of the following statements best describes a certification authority?

Answer :
  • A certification authority is an entity that issues digital certificates for use by other parties

John works as an Office Assistant in DataSoft Inc. He has received an e-mail from duesoft_lotterygroup@us.com with the following message: The DueSoft Lottery Incorporation This is to inform you that you have just won a prize of $7,500.00 for this year's Annual Lottery promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect active online e-mails and select five people every year as our winners through an electronic balloting machine. Please reply within three days of receiving this e-mail with your full details like Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your prize. If John replies to this e-mail, which of the following attacks may he become vulnerable to?

Answer :
  • Phishing attack

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: Which of the following tools is John using to crack the wireless encryption keys?

Answer :
  • AirSnort

Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

Answer :
  • Brain

Which of the following is used in asymmetric encryption?

Answer :
  • Public key and private key