ECSS試験無料問題集「EC-COUNCIL EC-Council Certified Security Specialist (ECSSv10) 認定」

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.

解説: (GoShiken メンバーにのみ表示されます)
Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization's network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigating team required to handle the case, investigative procedures, and possible outcome of the forensic process.
Identify the type of analysis performed by Clark in the above scenario.

解説: (GoShiken メンバーにのみ表示されます)
Robert, a security specialist, was appointed to strengthen the security of the organization's network. To prevent multiple login attempts from unknown sources, Robert implemented a security strategy of issuing alerts or warning messages when multiple failed login attempts are made.
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?

解説: (GoShiken メンバーにのみ表示されます)
Jay, a network administrator, was monitoring traffic flowing through an IDS. Unexpectedly, he received an event triggered as an alarm, although there is no active attack in progress.
Identify the type of IDS alert Jay has received in the above scenario.

解説: (GoShiken メンバーにのみ表示されます)
Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.
Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

解説: (GoShiken メンバーにのみ表示されます)
Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.
Identify the mobile device security risk raised on Stella's device in the above scenario.

解説: (GoShiken メンバーにのみ表示されます)
James is a professional hacker who managed to penetrate the target company's network and tamper with software by adding a malicious script in the production that holds persistence on the network.
Which of the following phases of hacking is James currently in?

解説: (GoShiken メンバーにのみ表示されます)
A disk drive has 16.384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512bytes of data. What is the total size of the disk?

解説: (GoShiken メンバーにのみ表示されます)
Peter, an attacker aiming to disrupt organizational services, targeted a configuration protocol that issues IP addresses to host systems. To disrupt the issuance of IP addresses. Peter flooded the target server with spoofed MAC addresses so that valid users cannot receive IP addresses to access the network.
Identify the type of attack Peter has performed in the above scenario.

解説: (GoShiken メンバーにのみ表示されます)
In which of the following levels of the OSI model does an attacker gain control over the HTTP user session by obtaining the session IDs and create new unauthorized sessions by using the stolen data?

解説: (GoShiken メンバーにのみ表示されます)