Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ECSS Exam Dumps - ECCouncil EC-Council Certified Security Specialist Questions and Answers

Question # 24

Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.

Which of the following type of physical security controls has Jacob implemented in the above scenario?

Options:

A.

Detective control

B.

Preventive controls

C.

Deterrent controls

D.

Recovery controls

Buy Now
Question # 25

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

Options:

A.

1026/64666

B.

9150/9151

C.

3024/4092

D.

31/456

Buy Now
Question # 26

Clark is an unskilled hacker attempting to perform an attack on a target organization to gain popularity. He downloaded and used freely available hacking tools and software developed by other professional hackers for this purpose.

Identify the type of threat actor described in the above scenario.

Options:

A.

Script kiddie

B.

industrial spy

C.

Hacktivist

D.

Cyber terrorist

Buy Now
Question # 27

An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.

Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?

Options:

A.

Communication Layer

B.

Process layer

C.

Cloud layer

D.

Device layer

Buy Now
Question # 28

John, from a remote location, was monitoring his bedridden grandfather’s health condition at his home. John has placed a smart wearable ECC on his grandfather's wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather's health condition periodically.

Which of the following types of loT communication model was demonstrated in the above scenario?

Options:

A.

Cloud-lo-cloud communication model

B.

Device to gateway model

C.

Device to device model

D.

Device-to-cloud model

Buy Now
Question # 29

Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.

Identify the role played by Jennifer in the forensics investigation.

Options:

A.

Evidence manager

B.

Expert witness

C.

Incident responder

D.

Incident analyzer

Buy Now
Question # 30

Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.

netstat [ a] [e] [-nJ [-o] [ p Protocol] [-r] [-s] [interval]

Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.

Options:

A.

l-S]

B.

[-O]

C.

[-n]

D.

[-r]

Buy Now
Question # 31

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults, overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

Options:

A.

Docker registry attack

B.

Cross container attack

C.

Container escaping attack

D.

Replay attack

Buy Now
Question # 32

Steve, a professional pen tester, was hired by an organization to assess its cybersecurity. The organization provided Steve with details such as network topology documents, asset inventory, and valuation information. This information helped Steve complete the penetration test successfully, and he provided a snapshot of the organization's current security posture.

Identify the penetration testing strategy followed by Steve in the above scenario.

Options:

A.

White-box testing

B.

Goal oriented penetration testing

C.

Black box testing

D.

Grey box testing

Buy Now
Question # 33

Below are the various steps involved in forensic readiness planning.

l.Keep an incident response team ready to review the incident and preserve the evidence.

2.Create a process for documenting the procedure.

3.ldentify the potential evidence required for an incident.

4.Determine the sources of evidence.

5.Establish a legal advisory board to guide the investigation process.

6.ldentify if the incident requires full or formal investigation.

7.Establish a policy for securely handling and storing the collected evidence.

8.Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption. Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.

1 >2 >3 >4 -5 >6 >7 >8

B.

2..>3->l->4->6->5->7->8

C.

3 >4 >8 >7 >6 >2 >5 >1

D.

3 >1. >4 >S >8 >2 >6 >7

Buy Now
Exam Code: ECSS
Exam Name: EC-Council Certified Security Specialist (ECSSv10)Exam
Last Update: Feb 23, 2025
Questions: 100
ECSS pdf

ECSS PDF

$25.5  $84.99
ECSS Engine

ECSS Testing Engine

$28.5  $94.99
ECSS PDF + Engine

ECSS PDF + Testing Engine

$40.5  $134.99