EC-Council ECSS EC-Council Certified Security Specialist Practice Test Online Training
EC-Council ECSS Online Training
The questions for ECSS were last updated at Mar 06,2025.
- Exam Code: ECSS
- Exam Name: EC-Council Certified Security Specialist Practice Test
- Certification Provider: EC-Council
- Latest update: Mar 06,2025
Johnson is a professional hacker who targeted an organization’s customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
- A . Password guessing
- B . Rainbow table attack
- C . Dictionary attack
- D . Brute force attack
Johnson is a professional hacker who targeted an organization’s customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
- A . Password guessing
- B . Rainbow table attack
- C . Dictionary attack
- D . Brute force attack
Johnson is a professional hacker who targeted an organization’s customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
- A . Password guessing
- B . Rainbow table attack
- C . Dictionary attack
- D . Brute force attack
Johnson is a professional hacker who targeted an organization’s customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
- A . Password guessing
- B . Rainbow table attack
- C . Dictionary attack
- D . Brute force attack
The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original challenge text.
What is the correct sequence of steps involved in establishing a network connection using the shared key authentication process?
- A . 2―>4―>3
- B . 4―>2―>1―>3―>5
- C . 4―>1―>3―>5―>2
- D . 4―>5―>3―>2―>1
An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
- A . Firewall
- B . Router
- C . Intrusion detection system
- D . Honeypot
Kane, an investigation specialist, was appointed to investigate an incident in an organization’s network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.
In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?
- A . ipconfig < interface name >
- B . ifconfig < interface name >
- C . nmap -sT localhost
- D . netstat -i
Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.
In which of the following states has Steve encrypted the data in the above scenario?
- A . Data in transit
- B . Data in rest
- C . Data in use
- D . Data inactive
Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah’s computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.
Identify the Internet access policy demonstrated in the above scenario.
- A . Promiscuous policy
- B . Paranoid policy
- C . Permissive policy
- D . Prudent policy
Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six-digit code, using which they can enter the office at any time.
Which of the following combinations of authentication mechanisms is implemented in the above scenario?
- A . Password and two-factor authentication
- B . Two-factor and smart card authentication
- C . Biometric and password authentication
- D . Smart card and password authentication