Note: Udemy FREE coupon codes are valid for maximum 3 days only. Look for “Get Coupon” blue button at the end of Description.

Attend this ECSS EC-Council Certified Security Specialist Practice Exam will get a Good Score 80% on Main Exam

Description

Sample Questions:

Which of the following tunneling protocols is used to make data transfers secure on the network layer?

L2TP

L2F

IPSec

PPTP

Which of the following OSI layers is used for routers?

Application layer

Network layer

Physical layer

Transport layer

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Eavesdropping

Denial of service

Dialer attack

Intrusion

Which of the following wireless networks transmits data probably at 115 Kbps?

WWAN

WLAN

WMAN

WPAN

Which of the following is NOT a Wired Equivalent Privacy authentication method?

Media access authentication

Shared key authentication

Kerberos authentication

Open system authentication

Which of the following functions does the RSA Digital Signature combine with public key algorithm to create a more secure signature?

%

$

#

*

Which of the following algorithms is used by the Advanced Encryption Standard (AES)?

Randel

3 DES

Two fish

Blowfish

Which of the following is an example of a social engineering attack?

Phishing

Man-in-the-middle attack

Browser Sniffing

E-mail bobbin

What does CSIRT stand for?

Computer Security Information Response Team

Chief Security Incident Response Team

Computer Security Incident Response Team

Chief Security Information Response Team

Which of the following are the two primary U.S. laws that address cybercrime?

1030 and 1362

1029 and 2510

1030 and 2510

1029 and 1030

«
»

Leave a Reply