Eccouncil ecss practice test

EC-Council Certified Security Specialist (ECSS) Exam

Last exam update: Oct 31 ,2024
Page 1 out of 24. Viewing questions 1-15 out of 354

Question 1

Which of the following statements explains the dumpster diving hacking technique?
A. This is an information gathering technique in which the attacker runs a software program to
automatically call thousands of telephone numbers to find out a victim who has attached a modem
to the Internet.
B. This is an information gathering technique in which an attacker rummages through all the
discarded waste-papers in the victim's trash.
C. This is an information gathering technique in which the attacker calls the help center of the
organization and asks someone to reset a password.
D. This is an information gathering technique in which the attacker injects a Trojan in the victim's
computer.

Mark Question:
Answer:

B

Discussions
0 / 1000

Question 2

Which of the following techniques is used to log network traffic?

  • A. Cracking
  • B. IP address spoofing
  • C. Sniffing
  • D. Tunneling
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following tools is used to verify Group Policy Object (GPO) settings?

  • A. Psinfo
  • B. Resplendent registrar
  • C. Fport
  • D. Pslist
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following statements is true about a honeyfarm?

  • A. It is a computer system used to attract hackers to identify them.
  • B. It is a computer system that has no security.
  • C. It is a centralized collection of honeypots.
  • D. It is a firewall.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following commands is used to test a network connection?

  • A. Popd
  • B. Path
  • C. Perfmon
  • D. Ping
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

What is the size of Master Boot Record (MBR)?
A. 512 bytes
B. 256 bytes
C. 1 KB
D. 2 KB

Mark Question:
Answer:

A

Discussions
0 / 1000

Question 7

Which of the following is a transport layer circuit-level proxy server?

  • A. Bastion host
  • B. UDP proxy
  • C. SOCKS
  • D. Forced proxy
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following steps in the Computer Forensic Investigation process limits the extent and
significance of an incident to ensure that it does not spread to other systems?

  • A. Containment
  • B. Detection
  • C. Preparation
  • D. Eradication
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following forensic tool suite is developed for Linux operating system?

  • A. MForensicsLab
  • B. S.M.A.R.T.
  • C. Wetstone
  • D. ProDiscover
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following law does not protect intellectual property?
A. Murphy's law
B. Trademark
C. Patent law
D. Copyright

Mark Question:
Answer:

A

Discussions
0 / 1000

Question 11

Which of the following tools is used to clear the event log?

  • A. Elsave
  • B. Auditpol
  • C. John the Ripper
  • D. AirSnort
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following password cracking attacks is implemented by calculating all the possible
hashes for a set of characters?

  • A. Rainbow attack
  • B. Dictionary attack
  • C. Brute force attack
  • D. SQL injection attack
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following attacks is used to hack simple alphabetical passwords?

  • A. Dictionary-based attack
  • B. Black hat attack
  • C. Sniffing
  • D. Man-in-the-middle attack
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following is the phase of Incident handling process in which the distinction between an
event and an incident is made?
A. Identification phase
B. Preparation phase
C. Eradication phase
D. Differential phase

Mark Question:
Answer:

A

Discussions
0 / 1000

Question 15

Which of the following programs is used to monitor the keystrokes that a user types on a specific
computer's keyboard?

  • A. Keylogger
  • B. Brutus
  • C. Ettercap
  • D. THC-Hydra
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2