ExamGecko
Home Home / ECCouncil / ECSS

ECCouncil ECSS Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Below are the various steps involved in forensic readiness planning.

l .Keep an incident response team ready to review the incident and preserve the evidence.

2 .Create a process for documenting the procedure.

3.ldentify the potential evidence required for an incident.

4.Determine the sources of evidence.

5.Establish a legal advisory board to guide the investigation process.

6.ldentify if the incident requires full or formal investigation.

7.Establish a policy for securely handling and storing the collected evidence.

8.Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption. Identify the correct sequence of steps involved in forensic readiness planning.

A.

1 >2 >3 >4 -5 >6 >7 >8

A.

1 >2 >3 >4 -5 >6 >7 >8

Answers
B.

2..>3->l->4->6->5->7->8

B.

2..>3->l->4->6->5->7->8

Answers
C.

3 >4 >8 >7 >6 >2 >5 >1

C.

3 >4 >8 >7 >6 >2 >5 >1

Answers
D.

3 >1. >4 >S >8 >2 >6 >7

D.

3 >1. >4 >S >8 >2 >6 >7

Answers
Suggested answer: C

Explanation:

Let's break down the steps involved in forensic readiness planning and identify the correct sequence:

Keep an incident response team ready to review the incident and preserve the evidence.

Create a process for documenting the procedure.

Identify the potential evidence required for an incident.

Determine the sources of evidence.

Establish a legal advisory board to guide the investigation process.

Identify if the incident requires full or formal investigation.

Establish a policy for securely handling and storing the collected evidence.

Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption.

James is a professional hacker attempting to gain access to an industrial system through a remote control device. In this process, he used a specially designed radio transceiver device to sniff radio commands and inject arbitrary code into the firmware of the remote controllers to maintain persistence.

Which of the following attacks is performed by James in the above scenario?

A.

Malicious reprogramming attack

A.

Malicious reprogramming attack

Answers
B.

Re pairing with a malicious RF controller

B.

Re pairing with a malicious RF controller

Answers
C.

Command injection

C.

Command injection

Answers
D.

Abusing reprogramming attack

D.

Abusing reprogramming attack

Answers
Suggested answer: A

Explanation:

James is performing amalicious reprogramming attackin the given scenario. He uses a specially designed radio transceiver device to sniff radio commands and inject arbitrary code into the firmware of the remote controllers. This allows him to maintain persistence and potentially gain unauthorized access to the industrial system.

EC-Council Certified Security Specialist (E|CSS) documents and study guide12.

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:\> net view <10.10.10.11>

What was Jessy's objective in running the above command?

A.

Verify the users using open sessions

A.

Verify the users using open sessions

Answers
B.

Check file space usage to look for a sudden decrease in free space

B.

Check file space usage to look for a sudden decrease in free space

Answers
C.

Check whether sessions have been opened with other systems

C.

Check whether sessions have been opened with other systems

Answers
D.

Review file shares to ensure their purpose

D.

Review file shares to ensure their purpose

Answers
Suggested answer: D

Explanation:

Thenet viewcommand in Windows is used to display a list of resources being shared on a computer.When used with a specific computer name or IP address, as innet view <10.10.10.11>, it displays the shared resources available on that particular computer1. Jessy's objective in running this command was likely to review the file shares on the server with the IP address 10.10.10.11 to ensure that they are correctly purposed and not maliciously altered or added as part of the web attack.

This command does not verify users using open sessions, check file space usage, or check whether sessions have been opened with other systems. Instead, it specifically lists the shared resources, which can include file shares and printer shares, providing insight into what is being shared from the server in question. This information is crucial during a forensic investigation of a web attack to understand if and how the server's shared resources were compromised or utilized by the attacker.

Identify the backup mechanism that is performed within the organization using external devices such as hard disks and requires human interaction to perform the backup operations, thus, making it suspect able to theft or natural disasters.

A.

Offsite data backup

A.

Offsite data backup

Answers
B.

Cloud data backup

B.

Cloud data backup

Answers
C.

Online data backup

C.

Online data backup

Answers
D.

Onsite data backup

D.

Onsite data backup

Answers
Suggested answer: D

Explanation:

The backup mechanism described in the scenario, which involves using external devices (such as hard disks) and requires human interaction for backup operations, is known asonsite data backup. In this approach, backups are stored within the organization's premises, making them susceptible to theft, damage, or natural disasters. It is essential to consider additional offsite or cloud-based backup solutions to enhance data resilience and security.

Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.

Which of the following commands assisted Michael in identifying open ports in the above scenario?

A.

nmap -sT localhost

A.

nmap -sT localhost

Answers
B.

netstat -i

B.

netstat -i

Answers
C.

ilconfig promise

C.

ilconfig promise

Answers
D.

netstat rn

D.

netstat rn

Answers
Suggested answer: B

Explanation:

Michael used thenetstatcommand with the-ioption to identify open ports on the system. The-iflag displays network interfaces and their statistics, including information about open ports. By analyzing this output, Michael could determine which ports were active and potentially vulnerable to unauthorized access.

EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.

EC-Council Certified Security Specialist (ECSS) program information1.

EC-Council ECSS Certification Syllabus and Prep Guide.

EC-Council ECSS Certification Sample Questions and Practice Exam.

EC-Council ECSS brochure3.

Alana, an employee in an organization, took a short break after spending exhausting hours on a project. For relaxation, she went to a cafeteria with her laptop, where she connected to the public Internet. While browsing the web, she received a project modifications file on her mail and reverted with another file that contained the required changes.

Which of the following BYOD risks has emerged from the above scenario?

A.

Mixing personal and private data

A.

Mixing personal and private data

Answers
B.

Endpoint security issue

B.

Endpoint security issue

Answers
C.

Improper disposing of devices

C.

Improper disposing of devices

Answers
D.

Sharing confidential data on unsecured networks

D.

Sharing confidential data on unsecured networks

Answers
Suggested answer: D

Explanation:

In the given scenario, Alana's actions pose a risk related tosharing confidential data on unsecured networks. Here's why:

BYOD (Bring Your Own Device): Alana used her personal laptop in a public cafeteria. This falls under the BYOD concept, where employees use their personal devices for work-related tasks.

Unsecured Network: Connecting to the public Internet in a cafeteria means she is using an unsecured network. Public Wi-Fi networks are often vulnerable to eavesdropping and unauthorized access.

Email Communication: Alana received a project modifications file via email and sent back another file with changes. Email communication over an unsecured network can expose sensitive information to potential attackers.

Risk: By sharing project-related files over an unsecured network, Alana risks exposing confidential data to unauthorized individuals.

EC-Council Certified Security Specialist (E|CSS) course materials and study guide.

EC-Council Certified Security Specialist (E|CSS) documents and course content12.

Bob, a security professional, was recruited by an organization to ensure that application services are being delivered as expected without any delay. To achieve this. Bob decided to maintain different backup servers for the same resources so that if one backup system fails, another will serve the purpose.

Identify the IA principle employed by Bob in the above scenario.

A.

Integrity

A.

Integrity

Answers
B.

Confidentiality

B.

Confidentiality

Answers
C.

Authentication

C.

Authentication

Answers
D.

Availability

D.

Availability

Answers
Suggested answer: D

Explanation:

In the given scenario, Bob's decision to maintain different backup servers for the same resources demonstrates the principle ofavailability. By having redundant backup systems, Bob ensures that the services remain accessible even if one system fails.

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.

Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.

A.

WPA

A.

WPA

Answers
B.

WPA3

B.

WPA3

Answers
C.

WEP

C.

WEP

Answers
D.

EAP

D.

EAP

Answers
Suggested answer: B

Explanation:

Peter's security solution for wireless communication uses thedragonfly key exchangefor authentication. This key exchange method is a crucial component ofWPA3(Wi-Fi Protected Access 3). WPA3 is an improved wireless security protocol that enhances protection against dictionary attacks and provides forward secrecy. The dragonfly handshake in WPA3 makes it impossible for attackers to record the 4-Way Handshake and launch offline dictionary attacks.Additionally, WPA3 introduces perfect forward secrecy, preventing attackers from decrypting past traffic after a key breach12.

EC-Council Certified Security Specialist (E|CSS) documents and study guide

EC-Council Certified Security Specialist (E|CSS) course materials3

Which of the following environmental controls options saves the hardware from humidity and heat, increases hardware performance, and maintains consistent room temperature?

A.

Hot and cold aisles

A.

Hot and cold aisles

Answers
B.

Lighting system

B.

Lighting system

Answers
C.

EMI shielding

C.

EMI shielding

Answers
D.

Temperature indicator

D.

Temperature indicator

Answers
Suggested answer: A

Explanation:

Hot and cold aisle containment systems are environmental control strategies used in data centers to manage the temperature and humidity levels. This setup involves alternating rows of cold air intakes and hot air exhausts. The cold aisles face air conditioner output ducts, while the hot aisles face air conditioner return ducts. This arrangement can significantly improve the efficiency of cooling systems, protect hardware from overheating and humidity, enhance hardware performance, and maintain a consistent room temperature.

Martin, a hacker, aimed to crash a target system. For this purpose, he spoofed the source IP address with the target's IP address and sent many ICMP ECHO request packets to an IP broadcast network, causing all the hosts to respond to the received ICMP ECHO requests and ultimately crashing the target machine.

Identify the type of attack performed by Martin in the above scenario.

A.

UDP flood attack

A.

UDP flood attack

Answers
B.

Multi vector attack

B.

Multi vector attack

Answers
C.

Smurf attack

C.

Smurf attack

Answers
D.

Fragmentation attack

D.

Fragmentation attack

Answers
Suggested answer: C

Explanation:

In the scenario described, Martin conducted a Smurf attack. This type of attack involves spoofing the source IP address with the target's IP address and sending ICMP ECHO request packets to an IP broadcast network. The broadcast network then amplifies the traffic by directing it to all hosts, which respond to the ICMP ECHO requests. This flood of responses is sent back to the spoofed source IP address, which is the target system, leading to its overload and potential crash.The Smurf attack is a type of distributed denial-of-service (DDoS) attack that exploits the vulnerabilities of the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP).Reference: EC-Council Certified Security Specialist (E|CSS) course materials and documents

Total 100 questions
Go to page: of 10