ECCouncil ECSS Practice Test - Questions Answers, Page 8
List of questions
Related questions
Jay, a network administrator, was monitoring traffic flowing through an IDS. Unexpectedly, he received an event triggered as an alarm, although there is no active attack in progress.
Identify the type of IDS alert Jay has received in the above scenario.
True negative alert
False negative alert
True positive alert
False positive alert
Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.
Identify the mobile device security risk raised on Stella's device in the above scenario.
Network-based risk
Physical security risks
Application-based risk
System-based risk
Below are the various steps involved in an email crime investigation.
1.Acquiring the email data
2.Analyzing email headers
3.Examining email messages
4.Recovering deleted email messages
5.Seizing the computer and email accounts
6.Retrieving email headers
What is the correct sequence of steps involved in the investigation of an email crime?
5->l->3->6-->2 >4
2->4->3-->6->5-->l
1--->3->4--->2-->5'>6
5 -> 1 -> 6 -> 2 -> 3 -> 4
Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Transposition cipher
Stream cipher
Block cipher
Substitution cipher
Daniel, a networking specialist, identifies a glitch in a networking tool and fixes it on a priority using a system.
Daniel was authorized to make a copy of computers programs while maintaining or repairing the system.
Which of the following acts was demonstrated in the above scenario?
Data Protection Act 2018 (DPA)
The Digital Millennium Copyright Act (DMCA)
Sarbanes Oxley Act (SOX)
Gramm Leach Bliley Act (GLBA)
Jack, a forensic investigator, was appointed to investigate a Windows-based security incident. In this process, he employed an Autopsy tool to recover the deleted files from unallocated space, which helps in gathering potential evidence.
Which of the following functions of Autopsy helped Jack recover the deleted files?
Timeline analysis
Web artifacts
Data carving
Multimedia
Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
Stateful protocol analysis
Anomaly-based
Signature-based
Application proxy
Wesley, a fitness freak, purchased a new Apple smartwatch and synced it with a mobile app downloaded from an unauthorized third party. At the end of the day, when Wesley attempted to access his fitness report from the app, it generated an unusual report and asked for some unnecessary permissions to view it.
Which of the following mobile risks is demonstrated in the above scenario?
Insecure data storage
Improper platform usage
Client code quality
Insecure authentication
Kevin logged into a banking application with his registered credentials and tried to transfer some amount from his account to Flora's account. Before transferring the amount to Flora's account, the application sent an OTP to Kevin's mobile for confirmation.
Which of the following authentication mechanisms is employed by the banking application in the above scenario?
Single sign on (SSO) authentication
Smart card authentication
Biometric authentication
Two factor authentication
Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process. Bob used the command ''netstat -ano' to view all the active connections in the system and determined that the connections established by the Tor browser were closed. Which of the following states of the connections established by Tor indicates that the Tor browser is closed?
ESTABLISHED
CLOSE WAIT
TIMEWAIT
LISTENING
Question