top of page
  • Writer's pictureKaty Morgan

Introduction to EC-Council Certified Security Specialist (ECSS) Exam

The EC-Council ECSS Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the ECSS certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. These study guide for the EC-Council Security Specialist will help guide you through the study process for your certification.

ECSS pdf, ECSS questions, ECSS exam guide, ECSS practice test, ECSS books, ECSS Syllabus, ECSS

ECSS EC-Council Security Specialist Exam Summary


Exam Name: EC-Council Security Specialist

Exam Code: ECSS

Exam Price: $249 (USD)

Duration: 120 mins

Number of Questions: 50

Passing Score: 70%

Reference Books: Courseware

Schedule Exam: Pearson VUE OR ECC Exam Center

Sample Questions: EC-Council ECSS Sample Questions


Exam Syllabus: ECSS EC-Council Certified Security Specialist (ECSS)


1. Information Security and Networking Fundamentals (9%)

- Overview of Information Security Fundamentals

- Understanding Information Security Laws and Regulations

- Overview of Networking Fundamentals

- Overview of OSI and TCP/IP Model

- Understanding Basic Network Security Procedures and Policies

- Overview of Secure Network Protocols

2. Information Security Threats and Attacks (21%)

- Understanding Various Stages of Hacking Cycle

- Understanding Internal Threats (Sniffing, ARP Spoofing, etc.)

- Understanding External Threats (Malware Attacks, Password Cracking, DoS, Session Hijacking, etc.)

- Overview of Different Social Engineering Techniques

- Understanding Various Firewall and IDS Evasion Techniques

- Understanding Various Wireless and VPN Threats

- Understanding Various Web Applications and Network Threats

- Understanding Email Crime


3. Information Security Controls (23%)

- Overview of Identification, Authentication, and Authorization

- Overview of Cryptography and Encryption Algorithms

- Understanding Different Firewall Technologies

- Overview of Intrusion Detection System (IDS)

- Introduction to Data Backup

- Securing Organization Against Various Information Security Attacks


4. Wireless Network, VPN, and Web Application Security (17%)

- Overview of Wireless Networks and Topology

- Understanding Different Types of Wireless Encryption

- Securing Wireless Networks

- Understanding VPN and Protocols Used to Secure VPN

- Introduction to Web Applications and Securing Web Application Against Web Attacks


5. Ethical Hacking and Pen Testing (1%)

- Introduction to Ethical Hacking

- Introduction to Penetration Testing


6. Incident Response and Computer Forensics Fundamentals (6%)

- Overview of Incident Handling and Response Process

- Understand Different Computer Security Incidents and Computer Crimes

- Overview of Computer Forensics Fundamentals

- Understanding Computer Forensics Investigation Methodology


7. Digital Evidence and File Systems (4%)

- Understanding Digital Evidence and Examination Process

- Collecting Digital Evidence from Electronic Devices

- Overview of Different File Systems (Windows, Linux, Mac OS X, and CD-ROM / DVD File Systems)


8. Windows and Network Forensics (10%)

- Understanding Network Forensics Analysis Mechanism

- Understanding Windows Forensics (Collecting Volatile and Non-volatile Information)

- Collecting Metadata and Events Data

- Introduction to Steganography

- Understanding Different Types of Steganography based on Cover Medium


9. Logs and Email Crime Forensics (6%)

- Examining Various Security Logs

- Overview of Event Correlation

- Overview of Email Technology

- Investigating Email Crime and Violation


10. Investigation Report (3%)

- Writing Computer Forensics Report

- Understanding Best Practices for Writing Forensics Report


EC-Council ECSS Certification Sample Questions and Answers


To make you familiar with EC-Council Security Specialist (ECSS) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for ECSS v9 ECSS Certification to test your understanding of EC-Council ECSS process with real EC-Council certification exam environment.


ECSS EC-Council Security Specialist Sample Questions:-


01. Which of the following attacks is used to hack simple alphabetical passwords?

a) Man-in-the-middle attack

b) Dictionary-based attack

c) Black hat attack

d) Sniffing


02. Which of the following tools is used to catch someone installing a rootkit or running a packet sniffer?

a) chkrootkit

b) rkhunter

c) Blue Pill

d) OSSEC


03. Which of the following security protocols are based on the 802.11i standard?

a) WEP

b) WPA2

c) WPA

d) WEP2


04. In which of the following complaint types does a fraudulent transaction take place?

a) Overpayment Fraud

b) FBI scams

c) Auction fraud

d) Computer damage


05. According to the case study, the departmental stores can dial in to distribution center computers to query their order status. Which protocol should they use to provide the highest level of security?

a) EAP

b) MS-CHAP version 2

c) MS-CHAP

d) Basic Authentication

e) PAP


06. Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?

a) Plagiarism

b) Turnitin

c) Copyright

d) Patent


07. What are the two common parts of a Remote Access Trojan (RAT)?

a) A client component and a server component

b) The outbound port and the inbound port

c) The ARP cache and the CAM table

d) The payload and the wrapper


08. A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures?

a) In order to digitally sign an electronic record, a person must use his/her public key.

b) In order to verify a digital signature, the signer's private key must be used.

c) In order to verify a digital signature, the signer's public key must be used.

d) In order to digitally sign an electronic record, a person must use his/her private key.


09. John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

a) Sequence++ attack

b) Phreaking

c) Man-in-the-middle attack

d) War dialing


10. Which of the following needs to be documented to preserve evidences for presentation in court?

a) Incident response policy

b) Account lockout policy

c) Separation of duties

d) Chain of custody


Answers:-


Answer 1:- b

Answer 2:- a

Answer 3:- b, c

Answer 4:- c

Answer 5:- a

Answer 6:- a

Answer 7:- a

Answer 8:- c, d

Answer 9- b

Answer 10:- d

bottom of page