최신 ECSS 무료덤프 - EC-COUNCIL EC-Council Certified Security Specialist (ECSSv10)

Bob has secretly installed smart CCTV devices (loT devices) outside his home and wants to access the recorded data from a remote location. These smart CCTV devices send sensed data to an intermediate device that carries out pre-processing of data online before transmitting it to the cloudfor storage and analysis. The analyzed data is then sent to Bob for initiating actions.
Identify the component of loT architecture that collects data from loT devices and performs data preprocessing.

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data. Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server.
Which of the following protocols provides the above-discussed email features?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Jack, a forensic investigator, was appointed to investigate a Windows-based security incident. In this process, he employed an Autopsy tool to recover the deleted files from unallocated space, which helps in gathering potential evidence.
Which of the following functions of Autopsy helped Jack recover the deleted files?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back tothe server to gain unauthorized access.
Identify the technique used by Stephen to gain unauthorized access to the target server.

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following practices makes web applications vulnerable to SQL injection attacks?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers' group on an organization's systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware's purpose.
Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.
Identify the type of fire-fighting system used by the rescue team in the above scenario.

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web.
She employed a proxy tool that makes his online activity untraceable.
Identify the type of proxy employed by John in the above scenario.

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six-digit code, using which they can enter the office at any time.
Which of the following combinations of authentication mechanisms is implemented in the above scenario?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기