ECCouncil ECSS Practice Test - Questions Answers, Page 6
List of questions
Related questions
Robert, a security specialist, was appointed to strengthen the security of the organization's network. To prevent multiple login attempts from unknown sources, Robert implemented a security strategy of issuing alerts or warning messages when multiple failed login attempts are made.
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?
Indefinite session timeout
Absence of account lockout for invalid session IDs
Small session-ID generation
Weak session-ID generation
Bruce, a professional hacker, targeted an OT network. He initiated a looping strategy to recover the password of the target system. He started sending one character at a time to check whether the first character entered is correct: If so, he continued the loop for consecutive characters. Using this technique. Bruce identified how much time the device takes to finish one complete password authentication process, through which he determined the correct characters in the target password.
Identify the type of attack launched by Bruce on the target OT network.
Code injection attack
Buller overflow attack
Reconnaissance attack
Side-channel attack
Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers' group on an organization's systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware's purpose.
Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?
Virtual Box
OllyDbg
QualNet
VMware vSphere
Which of the following standards and criteria version of SWCDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?
Standards and Criteria 11
Standards and Criteria 13
Standards and Criteria 17
Standards and Criteria 15
Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM. Security, and software using an automated tool called FTK Imager.
Which of the following Windows Registry hives' subkeys provide the above information to Bob?
H KEY-CLASSES. ROOT
HKEY .CURRENT CONFIG
HKEY CURRENT USER
HKEY LOCAL MACHINE
James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.
Identify the tool employed by James in the above scenario.
Promise Detect
DriveLetlerView
ESEDatabaseView
ProcDump
Kevin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kevin decided to use an automated tool to recover the damaged, corrupted, or deleted files.
Which of the following forensic tools can help Kevin in recovering deleted files?
Cain & Abel
Rohos Mini Drive
R-Sludio
Ophcrack
An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.
Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?
Communication Layer
Process layer
Cloud layer
Device layer
Below are the various stages of the virus lifecycle:
1) Replication
2)Detection
3)lncorporation
4)Design
5)Execution of the damage routine
6) Launch
What is the correct sequence of stages involved in the virus lifecycle?
3->l >2- >6 >5 >4
4 >2 >3 >5 >6- >1
4 >l->6 >2 >3- >5
1>2 >3- >4 >5- >6
Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Firewall
IDS
Honeypot
Proxy server
Question