최신 ECSS 무료덤프 - EC-COUNCIL EC-Council Certified Security Specialist (ECSSv10)
Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Identify the type of security solution employed by Stephen in the above scenario.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following practices makes web applications vulnerable to SQL injection attacks?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
Identify the type of IDS employed by Messy in the above scenario.
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Clark is an unskilled hacker attempting to perform an attack on a target organization to gain popularity. He downloaded and used freely available hacking tools and software developed by other professional hackers for this purpose.
Identify the type of threat actor described in the above scenario.
Identify the type of threat actor described in the above scenario.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Paola, a professional hacker, configured her wireless router in an organization's premises and advertised it with a spoofed SSID. She lured victims to connect to the router by sending the fake SSID. She started sniffing all the traffic from the victims that is passing through his wireless router.
Which of the following types of attacks is Paola performing in the above scenario?
Which of the following types of attacks is Paola performing in the above scenario?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Bob, a network administrator in a company, manages network connectivity to 200 employees in six different rooms. Every employee has their own laptop to connect to the Internet through a wireless network, but the company has only one broadband connection.
Which of the following types of wireless networks allows Bob to provide Internet access to every laptop and bring all the devices to a single network?
Which of the following types of wireless networks allows Bob to provide Internet access to every laptop and bring all the devices to a single network?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
John is working as a network administrator in an MNC company. He was instructed to connect all the remote offices with the corporate office but at the same time deny communication between the remote offices. In this process, he configured a central hub at the corporate head office, through which all branch offices can communicate.
Identify the type of VPN topology implemented by John in the above scenario.
Identify the type of VPN topology implemented by John in the above scenario.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Roxanne is a professional hacker hired by an agency to disrupt the business services of their rival company.
Roxanne employed a special type of malware that consumes a server's memory and network bandwidth when triggered. Consequently, the target server is overloaded and stops responding.
Identify the type of malware Roxanne has used in the above scenario.
Roxanne employed a special type of malware that consumes a server's memory and network bandwidth when triggered. Consequently, the target server is overloaded and stops responding.
Identify the type of malware Roxanne has used in the above scenario.
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults, overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.
Identify the type of attack initiated by Jacob in the above scenario.
Identify the type of attack initiated by Jacob in the above scenario.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:
C:\> net view <10.10.10.11>
What was Jessy's objective in running the above command?
C:\> net view <10.10.10.11>
What was Jessy's objective in running the above command?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)