EC-Council ECSS EC-Council Certified Security Specialist Practice Test Online Training
EC-Council ECSS Online Training
The questions for ECSS were last updated at Mar 07,2025.
- Exam Code: ECSS
- Exam Name: EC-Council Certified Security Specialist Practice Test
- Certification Provider: EC-Council
- Latest update: Mar 07,2025
Which of th© following titles of Th© Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?
- A . Title II
- B . Title I
- C . Title IV
- D . Title III
William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target’s range, he used special software to obtain the data stored in the victim’s device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.
Identify the attack performed by William in the above scenario.
- A . Bluesmacking
- B . Bluesnarfing
- C . Bluebugging
- D . Bluejacking
In which of the following levels of the OSI model does an attacker gain control over the HTTP user session by obtaining the session IDs and create new unauthorized sessions by using the stolen data?
- A . Presentation level
- B . Transport level
- C . Network-level
- D . Application-level
Andrew, a system administrator, is performing a UEFI boot process. The current phase of the UEFI boot process consists of the initialization code that the system executes after powering on the EFI system. This phase also manages platform reset events and sets up the system so that it can find,
validate, install, and run the PEI.
Which of the following UEFI boot phases is the process currently in?
- A . Pre-EFI initialization phase
- B . Security phase
- C . Boot device selection phase
- D . Driver execution environment phase
Wesley, a professional hacker, deleted a confidential file in a compromised system using the "/bin/rm/ command to deny access to forensic specialists.
Identify the operating system on which Don has performed the file carving activity.
- A . Windows
- B . Mac OS
- C . Linux
- D . Android
Christian is working as a software developer in a reputed MNC. He received a message from XIM bank that claims to be urgent and requests to call a phone number mentioned in the message. Worried by this, he called the number to check on his account, believing it to be an authentic XIM Bank customer service phone number. A recorded message asks him to provide his credit or debit card number, as well as his password.
Identify the type of social engineering attack being performed on Christian in the above scenario.
- A . SMiShing
- B . Spam mail
- C . Phishing
- D . Eavesdropping
James is a professional hacker who managed to penetrate the target company’s network and tamper with software by adding a malicious script in the production that holds persistence on the network.
Which of the following phases of hacking is James currently in?
- A . Clearing tracks
- B . Maintaining access
- C . Gaining access
- D . Scanning
Paola, a professional hacker, configured her wireless router in an organization’s premises and advertised it with a spoofed SSID. She lured victims to connect to the router by sending the fake SSID. She started sniffing all the traffic from the victims that is passing through his wireless router.
Which of the following types of attacks is Paola performing in the above scenario?
- A . Key reinstallation attack
- B . Ad-hoc connection attack
- C . Rogue AP attack
- D . AP MAC spoofing attack
Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems. Identify the role played by Jennifer in the forensics investigation.
- A . Evidence manager
- B . Expert witness
- C . Incident responder
- D . Incident analyzer
Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable. Identify the type of proxy employed by John in the above scenario.
- A . Reverse proxy
- B . Anonvmous proxy
- C . Explicit proxy
- D . SOCKS proxy