ECCouncil ECSS Practice Test - Questions Answers, Page 10
List of questions
Related questions
Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization's network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigating team required to handle the case, investigative procedures, and possible outcome of the forensic process.
Identify the type of analysis performed by Clark in the above scenario.
Data analysis
Log analysis
Traffic analysis
Case analysis
Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.
Which of the following type of physical security controls has Jacob implemented in the above scenario?
Detective control
Preventive controls
Deterrent controls
Recovery controls
Jessica, a user, wanted to access the Internet from her laptop and therefore sends a connection request to the access point. To identify the wireless client, the access point forwarded that request to a RADIUS server. The RADIUS server transmitted authentication keys to both the access point and Jessica's laptop. This key helps the access point identify a particular wireless client.
Identify the authentication method demonstrated in the above scenario.
Open system authentication
Null authentication
Shared key authentication
Centralized authentication
Mark, an attacker, aims to access an organization's internal server, but the local firewall implementation restricted him from achieving this objective. To overcome this issue, he started sending specially crafted requests to the public server, through which he gained access to the local server.
Identify the type of attack initiated by Mark in the above scenario.
Web cache poisoning attack
SSRF attack
TTP response-splitting attack
SSH brute-force attack
Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.
Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?
Reconnaissance signatures
Informational signatures
Unauthorized access signatures
Denial of service (DoS) signatures
Ben, a computer user, applied for a digital certificate. A component of PKI verifies Ben's identity using the credentials provided and passes that request on behalf of Ben to grant the digital certificate.
Which of the following PKI components verified Ben as being legitimate to receive the certificate?
Certificate directory
Validation authority (VA)
Certificate authority (CA)
Registration authority (RA)
Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data. Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server.
Which of the following protocols provides the above-discussed email features?
SHA-1
ICMP
SNMP
POP3
Sam is a hacker who decided to damage the reputation of an organization. He started collecting information about the organization using social engineering techniques. Sam aims to gather critical information such as admin passwords and OS versions to plan for an attack.
Identify the target employee in the organization from whom Sam can gather the required information.
Helpdesk
Third-party service provider
System administrators
Customer support learn
A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.
Identify the type of fire-fighting system used by the rescue team in the above scenario.
Fire extinguisher
Wet chemical suppressant
Standpipe system
Sprinkler system
Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.
Which of the following types of data acquisition techniques did Sarah employ in the above scenario?
Bit-stream disk-to-disk
Bit-stream disk-to-image file
Sparse acquisition
Logical acquisition
Question