최신 ECSS 무료덤프 - EC-COUNCIL EC-Council Certified Security Specialist (ECSSv10)
A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.
Which of the following port numbers does Tor use for establishing a connection via Tor nodes?
Which of the following port numbers does Tor use for establishing a connection via Tor nodes?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.
Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?
Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Carol is a new employee at ApTech Sol Inc., and she has been allocated a laptop to fulfill his job activities.
Carol tried to install certain applications on the company's laptop but could not complete the installation as she requires administrator privileges to initiate the installation process. The administrator imposed an access policy on the company's laptop that only users with administrator privileges have installation rights.
Identify the access control model demonstrated in the above scenario.
Carol tried to install certain applications on the company's laptop but could not complete the installation as she requires administrator privileges to initiate the installation process. The administrator imposed an access policy on the company's laptop that only users with administrator privileges have installation rights.
Identify the access control model demonstrated in the above scenario.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Kevin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kevin decided to use an automated tool to recover the damaged, corrupted, or deleted files.
Which of the following forensic tools can help Kevin in recovering deleted files?
Which of the following forensic tools can help Kevin in recovering deleted files?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization's network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigating team required to handle the case, investigative procedures, and possible outcome of the forensic process.
Identify the type of analysis performed by Clark in the above scenario.
Identify the type of analysis performed by Clark in the above scenario.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Daniel, a professional hacker, targeted Alice and lured her into downloading a malicious app from a third-party app store. Upon installation, the core malicious code inside the application started infecting other legitimate apps in Alice's mobile device. Daniel overloaded Alice's device with irrelevant and fraudulent advertisements through the infected app for financial gain.
Identify the type of attack Daniel has launched in the above scenario.
Identify the type of attack Daniel has launched in the above scenario.
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Robert, a security specialist, was appointed to strengthen the security of the organization's network. To prevent multiple login attempts from unknown sources, Robert implemented a security strategy of issuing alerts or warning messages when multiple failed login attempts are made.
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Christian is working as a software developer in a reputed MNC. He received a message from XIM bank that claims to be urgent and requests to call a phone number mentioned in the message. Worried by this, he called the number to check on his account, believing it to be an authentic XIM Bank customer service phone number.
A recorded message asks him to provide his credit or debit card number, as well as his password.
Identify the type of social engineering attack being performed on Christian in the above scenario.
A recorded message asks him to provide his credit or debit card number, as well as his password.
Identify the type of social engineering attack being performed on Christian in the above scenario.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Clark is an unskilled hacker attempting to perform an attack on a target organization to gain popularity. He downloaded and used freely available hacking tools and software developed by other professional hackers for this purpose.
Identify the type of threat actor described in the above scenario.
Identify the type of threat actor described in the above scenario.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
Which of the following types of network-based evidence was collected by Bob in the above scenario?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)