ECSS 無料問題集「EC-COUNCIL EC-Council Certified Security Specialist (ECSSv10)」
Daniel, a professional hacker, targeted Alice and lured her into downloading a malicious app from a third-party app store. Upon installation, the core malicious code inside the application started infecting other legitimate apps in Alice's mobile device. Daniel overloaded Alice's device with irrelevant and fraudulent advertisements through the infected app for financial gain.
Identify the type of attack Daniel has launched in the above scenario.
Identify the type of attack Daniel has launched in the above scenario.
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six-digit code, using which they can enter the office at any time.
Which of the following combinations of authentication mechanisms is implemented in the above scenario?
Which of the following combinations of authentication mechanisms is implemented in the above scenario?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process. Bob used the command "netstat -ano" to view all the active connections in the system and determined that the connections established by the Tor browser were closed.
Which of the following states of the connections established by Tor indicates that the Tor browser is closed?
Which of the following states of the connections established by Tor indicates that the Tor browser is closed?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Below are the various steps involved in an email crime investigation.
1.Acquiring the email data
2.Analyzing email headers
3.Examining email messages
4.Recovering deleted email messages
5.Seizing the computer and email accounts
6.Retrieving email headers
What is the correct sequence of steps involved in the investigation of an email crime?
1.Acquiring the email data
2.Analyzing email headers
3.Examining email messages
4.Recovering deleted email messages
5.Seizing the computer and email accounts
6.Retrieving email headers
What is the correct sequence of steps involved in the investigation of an email crime?
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Bob, a network administrator in a company, manages network connectivity to 200 employees in six different rooms. Every employee has their own laptop to connect to the Internet through a wireless network, but the company has only one broadband connection.
Which of the following types of wireless networks allows Bob to provide Internet access to every laptop and bring all the devices to a single network?
Which of the following types of wireless networks allows Bob to provide Internet access to every laptop and bring all the devices to a single network?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.
Identify the mobile device security risk raised on Stella's device in the above scenario.
Identify the mobile device security risk raised on Stella's device in the above scenario.
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.
Identify the Internet access policy demonstrated in the above scenario.
Identify the Internet access policy demonstrated in the above scenario.
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Johnson is a professional hacker who targeted an organization's customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
Identify the type of attack performed by Johnson in the above scenario.
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Clark is an unskilled hacker attempting to perform an attack on a target organization to gain popularity. He downloaded and used freely available hacking tools and software developed by other professional hackers for this purpose.
Identify the type of threat actor described in the above scenario.
Identify the type of threat actor described in the above scenario.
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)