ECCouncil ECSS Practice Test - Questions Answers
List of questions
Related questions
Below are the various steps involved in forensic readiness planning.
l .Keep an incident response team ready to review the incident and preserve the evidence.
2 .Create a process for documenting the procedure.
3.ldentify the potential evidence required for an incident.
4.Determine the sources of evidence.
5.Establish a legal advisory board to guide the investigation process.
6.ldentify if the incident requires full or formal investigation.
7.Establish a policy for securely handling and storing the collected evidence.
8.Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption. Identify the correct sequence of steps involved in forensic readiness planning.
1 >2 >3 >4 -5 >6 >7 >8
2..>3->l->4->6->5->7->8
3 >4 >8 >7 >6 >2 >5 >1
3 >1. >4 >S >8 >2 >6 >7
James is a professional hacker attempting to gain access to an industrial system through a remote control device. In this process, he used a specially designed radio transceiver device to sniff radio commands and inject arbitrary code into the firmware of the remote controllers to maintain persistence.
Which of the following attacks is performed by James in the above scenario?
Malicious reprogramming attack
Re pairing with a malicious RF controller
Command injection
Abusing reprogramming attack
While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:
C:\> net view <10.10.10.11>
What was Jessy's objective in running the above command?
Verify the users using open sessions
Check file space usage to look for a sudden decrease in free space
Check whether sessions have been opened with other systems
Review file shares to ensure their purpose
Identify the backup mechanism that is performed within the organization using external devices such as hard disks and requires human interaction to perform the backup operations, thus, making it suspect able to theft or natural disasters.
Offsite data backup
Cloud data backup
Online data backup
Onsite data backup
Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.
Which of the following commands assisted Michael in identifying open ports in the above scenario?
nmap -sT localhost
netstat -i
ilconfig promise
netstat rn
Alana, an employee in an organization, took a short break after spending exhausting hours on a project. For relaxation, she went to a cafeteria with her laptop, where she connected to the public Internet. While browsing the web, she received a project modifications file on her mail and reverted with another file that contained the required changes.
Which of the following BYOD risks has emerged from the above scenario?
Mixing personal and private data
Endpoint security issue
Improper disposing of devices
Sharing confidential data on unsecured networks
Bob, a security professional, was recruited by an organization to ensure that application services are being delivered as expected without any delay. To achieve this. Bob decided to maintain different backup servers for the same resources so that if one backup system fails, another will serve the purpose.
Identify the IA principle employed by Bob in the above scenario.
Integrity
Confidentiality
Authentication
Availability
Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.
WPA
WPA3
WEP
EAP
Which of the following environmental controls options saves the hardware from humidity and heat, increases hardware performance, and maintains consistent room temperature?
Hot and cold aisles
Lighting system
EMI shielding
Temperature indicator
Martin, a hacker, aimed to crash a target system. For this purpose, he spoofed the source IP address with the target's IP address and sent many ICMP ECHO request packets to an IP broadcast network, causing all the hosts to respond to the received ICMP ECHO requests and ultimately crashing the target machine.
Identify the type of attack performed by Martin in the above scenario.
UDP flood attack
Multi vector attack
Smurf attack
Fragmentation attack
Question