Exam Name: | EC-Council Certified Security Specialist (ECSSv10)Exam | ||
Exam Code: | ECSS Dumps | ||
Vendor: | ECCouncil | Certification: | EC-Council Certified Security Specialist |
Questions: | 100 Q&A's | Shared By: | jeevan |
Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.
Which of the following type of physical security controls has Jacob implemented in the above scenario?
Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?
Below are the elements included in the order of volatility for a typical computing system as per the RFC 3227 guidelines for evidence collection and archiving.
l.Archival media
2.Remote logging and monitoring data related to the target system
3.Routing table, process table, kernel statistics, and memory
4.Registers and processor cache
5-Physical configuration and network topology
6.Disk or other storage media
7.Temporary system files
Identify the correct sequence of order of volatility from the most to least volatile for a typical system.
Daniel, a professional hacker, targeted Alice and lured her into downloading a malicious app from a third-party app store. Upon installation, the core malicious code inside the application started infecting other legitimate apps in Alice's mobile device. Daniel overloaded Alice's device with irrelevant and fraudulent advertisements through the infected app for financial gain.
Identify the type of attack Daniel has launched in the above scenario.