ECCouncil ECSS Practice Test - Questions Answers, Page 4
List of questions
Related questions
Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.
Identify the Internet access policy demonstrated in the above scenario.
Promiscuous policy
Paranoid policy
Permissive policy
Prudent policy
Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six-digit code, using which they can enter the office at any time.
Which of the following combinations of authentication mechanisms is implemented in the above scenario?
Password and two-factor authentication
Two-factor and smart card authentication
Biometric and password authentication
Smart card and password authentication
Which of th following titles of Th Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?
Title II
Title I
Title IV
Title III
William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target's range, he used special software to obtain the data stored in the victim's device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.
Identify the attack performed by William in the above scenario.
Bluesmacking
Bluesnarfing
Bluebugging
Bluejacking
In which of the following levels of the OSI model does an attacker gain control over the HTTP user session by obtaining the session IDs and create new unauthorized sessions by using the stolen data?
Presentation level
Transport level
Network-level
Application-level
Andrew, a system administrator, is performing a UEFI boot process. The current phase of the UEFI boot process consists of the initialization code that the system executes after powering on the EFI system. This phase also manages platform reset events and sets up the system so that it can find, validate, install, and run the PEI.
Which of the following UEFI boot phases is the process currently in?
Pre-EFI initialization phase
Security phase
Boot device selection phase
Driver execution environment phase
Wesley, a professional hacker, deleted a confidential file in a compromised system using the '/bin/rm/ command to deny access to forensic specialists.
Identify the operating system on which Don has performed the file carving activity.
Windows
Mac OS
Linux
Android
Christian is working as a software developer in a reputed MNC. He received a message from XIM bank that claims to be urgent and requests to call a phone number mentioned in the message. Worried by this, he called the number to check on his account, believing it to be an authentic XIM Bank customer service phone number. A recorded message asks him to provide his credit or debit card number, as well as his password.
Identify the type of social engineering attack being performed on Christian in the above scenario.
SMiShing
Spam mail
Phishing
Eavesdropping
James is a professional hacker who managed to penetrate the target company's network and tamper with software by adding a malicious script in the production that holds persistence on the network.
Which of the following phases of hacking is James currently in?
Clearing tracks
Maintaining access
Gaining access
Scanning
Paola, a professional hacker, configured her wireless router in an organization's premises and advertised it with a spoofed SSID. She lured victims to connect to the router by sending the fake SSID. She started sniffing all the traffic from the victims that is passing through his wireless router.
Which of the following types of attacks is Paola performing in the above scenario?
Key reinstallation attack
Ad-hoc connection attack
Rogue AP attack
AP MAC spoofing attack
Question