EC-Council ECSS EC-Council Certified Security Specialist Practice Test Online Training
EC-Council ECSS Online Training
The questions for ECSS were last updated at Mar 06,2025.
- Exam Code: ECSS
- Exam Name: EC-Council Certified Security Specialist Practice Test
- Certification Provider: EC-Council
- Latest update: Mar 06,2025
Which of the following environmental controls options saves the hardware from humidity and heat, increases hardware performance, and maintains consistent room temperature?
- A . Hot and cold aisles
- B . Lighting system
- C . EMI shielding
- D . Temperature indicator
Martin, a hacker, aimed to crash a target system. For this purpose, he spoofed the source IP address with the target’s IP address and sent many ICMP ECHO request packets to an IP broadcast network, causing all the hosts to respond to the received ICMP ECHO requests and ultimately crashing the target machine.
Identify the type of attack performed by Martin in the above scenario.
- A . UDP flood attack
- B . Multi vector attack
- C . Smurf attack
- D . Fragmentation attack
Kevin, an attacker, is attempting to compromise a cloud server. In this process, Kevin intercepted the SOAP messages transmitted between a user and the server, manipulated the body of the message, and then redirected it to the server as a legitimate user to gain access and run malicious code on the cloud server.
Identify the attack initiated by Kevin on the target cloud server.
- A . Side-channel attack
- B . Wrapping attack
- C . Cross guest VM breaches
- D . DNS spoofing
Bob has secretly installed smart CCTV devices (loT devices) outside his home and wants to access the recorded data from a remote location. These smart CCTV devices send sensed data to an intermediate device that carries out pre-processing of data online before transmitting it to the cloud for storage and analysis. The analyzed data is then sent to Bob for initiating actions.
Identify the component of loT architecture that collects data from loT devices and performs data preprocessing.
- A . Data lakes
- B . Streaming data processor
- C . Gateway
- D . A Machine learning
Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?
- A . Kexts
- B . User account
- C . Command-line inputs
- D . Basic Security Module
Roxanne is a professional hacker hired by an agency to disrupt the business services of their rival company. Roxanne employed a special type of malware that consumes a server’s memory and network bandwidth when triggered. Consequently, the target server is overloaded and stops responding.
Identify the type of malware Roxanne has used in the above scenario.
- A . Rootkit
- B . Armored virus
- C . worm
- D . Spyware
Joseph, a security professional, was instructed to secure the organization’s network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.
Identify the attack signature analysis technique performed by Joseph in the above scenario.
- A . Composite-signature-based analysis
- B . Context based signature analysis
- C . Content based signature analysis
- D . Atomic signature based analysis
John, a forensic officer, was working on a criminal case. He employed imaging software to create a copy of data from the suspect device on a storage medium for further investigation. For developing an image of the original data, John used a software application that does not allow an unauthorized user to alter the image content on storage media, thereby retaining an unaltered image copy. Identify the data acquisition step performed by John in the above scenario.
- A . Validated data acquisition
- B . Planned for contingency
- C . Sanitized the target media
- D . Enabled write protection on the evidence media
Melissa, an ex-employee of an organization, was fired because of misuse of resources and security violations. She sought revenge against the company and targeted its network, as she is already aware of its network topology.
Which of the following categories of insiders does Melissa belong to?
- A . Malicious insider
- B . Professional insider
- C . Compromised insider
- D . Negligent insider
John, from a remote location, was monitoring his bedridden grandfather’s health condition at his home. John has placed a smart wearable ECC on his grandfather’s wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather’s health condition periodically.
Which of the following types of loT communication model was demonstrated in the above scenario?
- A . Cloud-lo-cloud communication model
- B . Device to gateway model
- C . Device to device model
- D . Device-to-cloud model