ECCouncil ECSS Practice Test - Questions Answers, Page 7
List of questions
Related questions
Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization's network.
Identify the type of network attack Bob initiated on the target organization in the above scenario.
Session hijacking
Buffer overflow
Data modification
Enumeration
Clark, a security professional, was instructed to monitor and continue the backup functions without interrupting the system or application services. In this process, Clark implemented a backup mechanism that dynamically backups the data even If the system or application resources are being used.
Which of the following types of backup mechanisms has Clark implemented in the above scenario?
Full backup
Cold backup
Hot backup
Offline backup
Paola, a professional hacker, was hired to break into the target organization's network and extract sensitive data. In this process, Paola found that the target organization has purchased new hardware. She accessed the new hardware while it was in transit and tampered with the hardware to make it vulnerable to attacks.
Identify the class of attack Paola has performed on the target organization.
Distribution attack
insider attack
Passive attack
Active attack
John is working as a network administrator in an MNC company. He was instructed to connect all the remote offices with the corporate office but at the same time deny communication between the remote offices. In this process, he configured a central hub at the corporate head office, through which all branch offices can communicate.
Identify the type of VPN topology implemented by John in the above scenario.
Point-to-point topology
Hub and spoke topology
Star topology
Mesh topology
Alice was working on her major project: she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
Reactive approach
Proactive approach
Preventive approach
Retrospective approach
Daniel, a professional hacker, targeted Alice and lured her into downloading a malicious app from a third-party app store. Upon installation, the core malicious code inside the application started infecting other legitimate apps in Alice's mobile device. Daniel overloaded Alice's device with irrelevant and fraudulent advertisements through the infected app for financial gain.
Identify the type of attack Daniel has launched in the above scenario.
Agent Smith attack
Bluebugging attack
SMiShing attack
SIM card attack
Sandra, a hacker, targeted Johana, a software professional, to steal her banking details. She started sending frequent, random pop-up messages with malicious links to her social media page. Johana accidentally clicked on a link, causing a malicious program to get installed in her system. Subsequently, when Johana attempted to access her banking website, the URL directed her to a malicious website controlled by Sandra. Johana entered her banking credentials on the fake website, which Sandra then captured.
Identify the type of attack performed by Sandra on Johana.
Shoulder surfing
Pharming
Tailgating
Dumpster diving
Clark is an unskilled hacker attempting to perform an attack on a target organization to gain popularity. He downloaded and used freely available hacking tools and software developed by other professional hackers for this purpose.
Identify the type of threat actor described in the above scenario.
Script kiddie
industrial spy
Hacktivist
Cyber terrorist
Bob, a network administrator in a company, manages network connectivity to 200 employees in six different rooms. Every employee has their own laptop to connect to the Internet through a wireless network, but the company has only one broadband connection.
Which of the following types of wireless networks allows Bob to provide Internet access to every laptop and bring all the devices to a single network?
Extension to wired network
3G/4G hotspot
Multiple wireless access points
LAN to LAN wireless network
An investigator wants to extract information about the status of the network interface cards (NICs) in an organization's Windows-based systems. Identify the command-line utility that can help the investigator detect the network status.
ipconfig
PsList
ifconfig
PsLoggedOn
Question