ExamGecko
Home / ECCouncil / ECSS / List of questions
Ask Question

ECCouncil ECSS Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Robert, a security specialist, was appointed to strengthen the security of the organization's network. To prevent multiple login attempts from unknown sources, Robert implemented a security strategy of issuing alerts or warning messages when multiple failed login attempts are made.

Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?

Become a Premium Member for full access
  Unlock Premium Member

Question 52

Report Export Collapse

Bruce, a professional hacker, targeted an OT network. He initiated a looping strategy to recover the password of the target system. He started sending one character at a time to check whether the first character entered is correct: If so, he continued the loop for consecutive characters. Using this technique. Bruce identified how much time the device takes to finish one complete password authentication process, through which he determined the correct characters in the target password.

Identify the type of attack launched by Bruce on the target OT network.

Become a Premium Member for full access
  Unlock Premium Member

Question 53

Report Export Collapse

Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers' group on an organization's systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware's purpose.

Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?

Become a Premium Member for full access
  Unlock Premium Member

Question 54

Report Export Collapse

Which of the following standards and criteria version of SWCDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Become a Premium Member for full access
  Unlock Premium Member

Question 55

Report Export Collapse

Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM. Security, and software using an automated tool called FTK Imager.

Which of the following Windows Registry hives' subkeys provide the above information to Bob?

Become a Premium Member for full access
  Unlock Premium Member

Question 56

Report Export Collapse

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 57

Report Export Collapse

Kevin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kevin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kevin in recovering deleted files?

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.

Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

Below are the various stages of the virus lifecycle:

1) Replication

2)Detection

3)lncorporation

4)Design

5)Execution of the damage routine

6) Launch

What is the correct sequence of stages involved in the virus lifecycle?

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.

Identify the type of security solution employed by Stephen in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member
Total 100 questions
Go to page: of 10
Search

Related questions