ECSS試験無料問題集「EC-COUNCIL EC-Council Certified Security Specialist (ECSSv10) 認定」
Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.
Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization's network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigating team required to handle the case, investigative procedures, and possible outcome of the forensic process.
Identify the type of analysis performed by Clark in the above scenario.
Identify the type of analysis performed by Clark in the above scenario.
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Robert, a security specialist, was appointed to strengthen the security of the organization's network. To prevent multiple login attempts from unknown sources, Robert implemented a security strategy of issuing alerts or warning messages when multiple failed login attempts are made.
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Jay, a network administrator, was monitoring traffic flowing through an IDS. Unexpectedly, he received an event triggered as an alarm, although there is no active attack in progress.
Identify the type of IDS alert Jay has received in the above scenario.
Identify the type of IDS alert Jay has received in the above scenario.
正解:D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.
Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?
Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.
Identify the mobile device security risk raised on Stella's device in the above scenario.
Identify the mobile device security risk raised on Stella's device in the above scenario.
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
James is a professional hacker who managed to penetrate the target company's network and tamper with software by adding a malicious script in the production that holds persistence on the network.
Which of the following phases of hacking is James currently in?
Which of the following phases of hacking is James currently in?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Peter, an attacker aiming to disrupt organizational services, targeted a configuration protocol that issues IP addresses to host systems. To disrupt the issuance of IP addresses. Peter flooded the target server with spoofed MAC addresses so that valid users cannot receive IP addresses to access the network.
Identify the type of attack Peter has performed in the above scenario.
Identify the type of attack Peter has performed in the above scenario.
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)