Join our Social media channels to get the latest discounts
Attend this ECCouncil CESS Security Certified Practice Test will get a Good Score 80% on Main Exam
Q) Fire walking is a technique that can be used to gather information to a remote firewall protected network. This method can be used effectively to make information gathering attacks. In this technique, an attacker sends a packet with a TTL value expires for a jump outside the firewall. Which of the following are prerequisites for attacking the coals? Each correct answer presents a complete solution. Select all that apply.
a) ICMP-packets coming from the network, should be allowed.
b) An attacker must know the IP-address last known to the firewall gateway.
c) There should be a backdoor is installed on the network.
d) An attacker must know the IP-address of the host is behind a firewall.
Q) Which of the following security protocols are based on the 802.11i standard? Each correct answer presents a complete solution. Select all that apply.
Q) Which of the following OSI layer is responsible for the protocol conversion, data encryption / decryption and data compression?
a) transport layer
b) presentation layer
c) link layer
d) network layer
Q) You are responsible for the security of a company that uses many web applications. You are more concerned about the shortcomings in the application for the attacker to get into the network. What method would be best to find these defects?
a) vulnerability analysis
b) Manual penetration testing
c) automated penetration testing
d) code review
Q) Which of the following representatives on the incident response team receives the forensic backup system, which are the subject of this incident?
a) Leading Researcher
b) Information Security Representative
c) technical representative
d) Legal representative