Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

ECCouncil ECSS Exam Actual Questions

The questions for ECSS were last updated on April 14, 2024.
  • Viewing page 1 out of 13 pages.
  • Viewing questions 1-4 out of 50 questions

Topic 1 - Exam A

Question #1 Topic 1

A security strategy in which several protection layers are placed throughout an information system helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. What is this security strategy called?

  • A. Network Security Zoning
  • B. Defense in Depth
  • C. Multi-aspect Model
  • D. Threat Modeling
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

Which of the following attack allows attackers to bypass client-ID security mechanisms and gain access privileges, and then inject malicious scripts into specific web pages?

  • A. Cross-Site Scripting (XSS)
  • B. Buffer Overflow
  • C. Denial-of-Service
  • D. Parameter/Form Tampering
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #3 Topic 1

The security of the network can be increased in a number of ways, for instance, by installing a special kind of web server and through packet filtering. What type of server is implemented as an intermediary server between a client and a server to act as a shield and protect and hide the computer from the outside network?

  • A. Application Server
  • B. Telnet Server
  • C. Web Server
  • D. Proxy Server
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #4 Topic 1

An algorithm which is a part of the U.S. government's long-term project to develop a set of standards for publicly available cryptography as authorized by the Computer Security Act of 1987 accepts a message of 264 bits in length and a 160-bit message output digest is produced to complicate text searching. Which of the following algorithms is a family of two similar hash functions, with different block sizes, and uses 32-bit words and 64-bit words?

  • A. SHA-2
  • B. SHA-0
  • C. SHA-1
  • D. SHA-3
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...