Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.
Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?
Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.
Identify the role played by Jennifer in the forensics investigation.
Answer : C
Jennifer's role as an incident responder involves handling and mitigating security incidents. In this scenario, she inspected the compromised system, gathered evidence, and disconnected it from the network to prevent further spread. Incident responders take immediate action to contain and manage security incidents.
A disk drive has 16.384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data. What is the total size of the disk?
Answer : B
Sectors per Cylinder: Multiply heads * sectors per track: 80 * 63 = 5040 sectors/cylinder
Bytes per Cylinder: Multiply sectors per cylinder * bytes per sector: 5040 * 512 = 2,580,480 bytes/cylinder
Total Bytes: Multiply bytes per cylinder * total cylinders: 2,580,480 * 16,384 = 42,278,584,320 bytes
Explanation
To find the total disk size, we need to calculate the storage capacity per cylinder and then multiply that by the total number of cylinders.
James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.
Identify the tool employed by James in the above scenario.
Martin, a hacker, aimed to crash a target system. For this purpose, he spoofed the source IP address with the target's IP address and sent many ICMP ECHO request packets to an IP broadcast network, causing all the hosts to respond to the received ICMP ECHO requests and ultimately crashing the target machine.
Identify the type of attack performed by Martin in the above scenario.
An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.
Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?
Answer : B
The other options listed pertain to different aspects of IoT architecture:
A . Communication Layer: This layer is responsible for transferring data from devices to the network and vice versa but does not process or analyze the data.
C . Cloud Layer: While the cloud layer may be involved in data storage and processing, it is not the primary layer responsible for the activities mentioned.
D . Device Layer: This layer includes the physical devices and sensors that collect data but does not process or analyze it.
Therefore, the correct answer is B, the Process layer, as it aligns with the responsibilities of managing and processing data within the IoT architecture.
Ben, a computer user, applied for a digital certificate. A component of PKI verifies Ben's identity using the credentials provided and passes that request on behalf of Ben to grant the digital certificate.
Which of the following PKI components verified Ben as being legitimate to receive the certificate?
Answer : D
In the context of Public Key Infrastructure (PKI), theRegistration Authority (RA)plays a crucial role in verifying the identity of individuals or entities requesting digital certificates. Here's how it works:
Ben, the computer user, applies for a digital certificate.
TheRAverifies Ben's identity using the credentials provided.
Once verified, theRAforwards the request on behalf of Ben to theCertificate Authority (CA).
TheCAthen issues the digital certificate to Ben.
Therefore, theRAis responsible for ensuring that legitimate individuals receive valid digital certificates by verifying their identity.
EC-Council Certified Security Specialist (E|CSS) documents and study guide1.
EC-Council Certified Security Specialist (E|CSS) course materials2.