Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ECSS Exam Dumps - EC-Council Certified Security Specialist (ECSSv10)Exam

Go to page:
Question # 17

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

A.

1026/64666

B.

9150/9151

C.

3024/4092

D.

31/456

Full Access
Question # 18

Melissa, an ex-employee of an organization, was fired because of misuse of resources and security violations. She sought revenge against the company and targeted its network, as she is already aware of its network topology.

Which of the following categories of insiders does Melissa belong to?

A.

Malicious insider

B.

Professional insider

C.

Compromised insider

D.

Negligent insider

Full Access
Question # 19

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

A.

Promise Detect

B.

DriveLetlerView

C.

ESEDatabaseView

D.

ProcDump

Full Access
Question # 20

Kane, an investigation specialist, was appointed to investigate an incident in an organization’s network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.

In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?

A.

ipconfig < interface name >

B.

ifconfig < interface name >

C.

nmap -sT localhost

D.

netstat -i

Full Access
Question # 21

Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.

Which of the following type of physical security controls has Jacob implemented in the above scenario?

A.

Detective control

B.

Preventive controls

C.

Deterrent controls

D.

Recovery controls

Full Access
Question # 22

Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah’s computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.

Identify the Internet access policy demonstrated in the above scenario.

A.

Promiscuous policy

B.

Paranoid policy

C.

Permissive policy

D.

Prudent policy

Full Access
Question # 23

Peter, an attacker aiming to disrupt organizational services, targeted a configuration protocol that issues IP addresses to host systems. To disrupt the issuance of IP addresses. Peter flooded the target server with spoofed MAC addresses so that valid users cannot receive IP addresses to access the network.

Identify the type of attack Peter has performed in the above scenario.

A.

Session hijacking

B.

Ping-of-death attack

C.

ARP spoofing

D.

DHCP starvation attack

Full Access
Question # 24

Christian is working as a software developer in a reputed MNC. He received a message from XIM bank that claims to be urgent and requests to call a phone number mentioned in the message. Worried by this, he called the number to check on his account, believing it to be an authentic XIM Bank customer service phone number. A recorded message asks him to provide his credit or debit card number, as well as his password.

Identify the type of social engineering attack being performed on Christian in the above scenario.

A.

SMiShing

B.

Spam mail

C.

Phishing

D.

Eavesdropping

Full Access
Go to page: