Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil ECSS Practice Exam with Questions & Answers | Set: 3

Questions 21

Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM. Security, and software using an automated tool called FTK Imager.

Which of the following Windows Registry hives' subkeys provide the above information to Bob?

Options:
A.

H KEY-CLASSES. ROOT

B.

HKEY .CURRENT CONFIG

C.

HKEY CURRENT USER

D.

HKEY LOCAL MACHINE

ECCouncil ECSS Premium Access
Questions 22

An investigator wants to extract information about the status of the network interface cards (NICs) in an organization's Windows-based systems. Identify the command-line utility that can help the investigator detect the network status.

Options:
A.

ipconfig

B.

PsList

C.

ifconfig

D.

PsLoggedOn

Questions 23

James is a professional hacker who managed to penetrate the target company’s network and tamper with software by adding a malicious script in the production that holds persistence on the network.

Which of the following phases of hacking is James currently in?

Options:
A.

Clearing tracks

B.

Maintaining access

C.

Gaining access

D.

Scanning

Questions 24

Below is an extracted Apache error log entry.

"(Wed Aug 28 13:35:38.878945 2020] (core:error] (pid 12356:tid 8689896234] (client 10.0.0.8] File not found: /images/folder/pic.jpg"

Identify the element in the Apache error log entry above that represents the IP address from which the request was made.

Options:
A.

10.0.0.8

B.

8689896234

C.

13:35:38.878945

D.

12356

Questions 25

Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Identify the attack signature analysis technique performed by Joseph in the above scenario.

Options:
A.

Composite-signature-based analysis

B.

Context based signature analysis

C.

Content based signature analysis

D.

Atomic signature based analysis

Questions 26

Melanie, a professional hacker, is attempting to break into a target network through an application server. In this process, she identified a logic flaw in the target web application that provided visibility into the source code. She exploited this vulnerability to launch further attacks on the target web application.

Which of the web application vulnerabilities was identified by Melanie in the above scenario?

Options:
A.

Insecure deserialization

B.

Security misconfiguration

C.

Command injection

D.

Broken authentication

Questions 27

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

Options:
A.

1026/64666

B.

9150/9151

C.

3024/4092

D.

31/456

Questions 28

James is a professional hacker attempting to gain access to an industrial system through a remote control device. In this process, he used a specially designed radio transceiver device to sniff radio commands and inject arbitrary code into the firmware of the remote controllers to maintain persistence.

Which of the following attacks is performed by James in the above scenario?

Options:
A.

Malicious reprogramming attack

B.

Re pairing with a malicious RF controller

C.

Command injection

D.

Abusing reprogramming attack

Questions 29

Roxanne is a professional hacker hired by an agency to disrupt the business services of their rival company. Roxanne employed a special type of malware that consumes a server's memory and network bandwidth when triggered. Consequently, the target server is overloaded and stops responding.

Identify the type of malware Roxanne has used in the above scenario.

Options:
A.

Rootkit

B.

Armored virus

C.

worm

D.

Spyware

Questions 30

Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data. Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server.

Which of the following protocols provides the above-discussed email features?

Options:
A.

SHA-1

B.

ICMP

C.

SNMP

D.

POP3