Note: Udemy FREE coupon codes are valid for maximum 3 days only. Look for “Get Coupon” blue button at the end of Description.
Attend this ECSS EC-Council Certified Security Specialist Practice Exam will get a Good Score 80% on Main Exam
Description
Sample Questions:
Which of the following tunneling protocols is used to make data transfers secure on the network layer?
L2TP
L2F
IPSec
PPTP
Which of the following OSI layers is used for routers?
Application layer
Network layer
Physical layer
Transport layer
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
Eavesdropping
Denial of service
Dialer attack
Intrusion
Which of the following wireless networks transmits data probably at 115 Kbps?
WWAN
WLAN
WMAN
WPAN
Which of the following is NOT a Wired Equivalent Privacy authentication method?
Media access authentication
Shared key authentication
Kerberos authentication
Open system authentication
Which of the following functions does the RSA Digital Signature combine with public key algorithm to create a more secure signature?
%
$
#
*
Which of the following algorithms is used by the Advanced Encryption Standard (AES)?
Randel
3 DES
Two fish
Blowfish
Which of the following is an example of a social engineering attack?
Phishing
Man-in-the-middle attack
Browser Sniffing
E-mail bobbin
What does CSIRT stand for?
Computer Security Information Response Team
Chief Security Incident Response Team
Computer Security Incident Response Team
Chief Security Information Response Team
Which of the following are the two primary U.S. laws that address cybercrime?
1030 and 1362
1029 and 2510
1030 and 2510
1029 and 1030
Leave a Reply
You must be logged in to post a comment.