Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil ECSS - EC-Council Certified Security Specialist (ECSSv10)Exam

Page: 3 / 3
Total 100 questions

A disk drive has 16.384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512bytes of data. What is the total size of the disk?

A.

42.278.584,340 bytes

B.

42.278.584,320 bytes

C.

42.279,584.320 bytes

D.

43,278,584,320 bytes

Which of the following practices makes web applications vulnerable to SQL injection attacks?

A.

Use the most restrictive SQL account types for applications

B.

Never build Transact SQL statements directly from user input

C.

Avoid constructing dynamic SQL with concatenated input values

D.

A Accept entries that contain binary data, escape sequences, and comment characters

Paola, a professional hacker, was hired to break into the target organization's network and extract sensitive data. In this process, Paola found that the target organization has purchased new hardware. She accessed the new hardware while it was in transit and tampered with the hardware to make it vulnerable to attacks.

Identify the class of attack Paola has performed on the target organization.

A.

Distribution attack

B.

insider attack

C.

Passive attack

D.

Active attack

Which of the following layers of the loT architecture is responsible for delivering services to respective users from different sectors such as building, industrial, manufacturing, automobile, security, and healthcare?

A.

Middleware layer

B.

Access gateway layer

C.

Application layer

D.

Edge technology layer

An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.

Identify the type of device deployed by Steven in the above scenario.

A.

Firewall

B.

Router

C.

Intrusion detection system

D.

Honeypot

Bob. a security specialist at an organization, extracted the following IIS log from a Windows-based server: “2019-12-12 06:11:41 192.168.0.10 GET /images/content/bg_body_l.jpg - 80 - 192.168.0.27 Mozilla/5.0 (Windows*NT»6.3:*WOW64)*AppleWebKit/537.36*(KHTML.*like»Cecko)*Chrome/48.0.2564.103»Safari/537.36 http://www.movie5cope.com/css/style.c5s 200 0 0 365"

Identify the element in the above IIS log entry that indicates the request was fulfilled without error.

A.

192

B.

80

C.

200

D.

537

Jay, a network administrator, was monitoring traffic flowing through an IDS. Unexpectedly, he received an event triggered as an alarm, although there is no active attack in progress.

Identify the type of IDS alert Jay has received in the above scenario.

A.

True negative alert

B.

False negative alert

C.

True positive alert

D.

False positive alert

Identify the backup mechanism that is performed within the organization using external devices such as hard disks and requires human interaction to perform the backup operations, thus, making it suspect able to theft or natural disasters.

A.

Offsite data backup

B.

Cloud data backup

C.

Online data backup

D.

Onsite data backup

Which of th© following titles of Th© Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?

A.

Title II

B.

Title I

C.

Title IV

D.

Title III

Below are the various steps involved in establishing a network connection using the shared key authentication process.

l.The AP sends a challenge text to the station.

2.The station connects to the network.

3.The station encrypts the challenge text using its configured 128-bit key and sends the encrypted text to the AP.

4.The station sends an authentication frame to the AP.

5.The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original challenge text.

What is the correct sequence of steps involved in establishing a network connection using the shared key authentication process?

A.

2 >4>3

B.

4—>2—>1—>3—>5

C.

4—>1—>3—>5—>2

D.

4-->5->3->2-->1