EC-Council Certified Security Specialist v9.0

Here you have the best ECCouncil ECSS practice exam questions

  • You have 50 total questions to study from
  • Each page has 5 questions, making a total of 10 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on October 23, 2025
  • This site is not affiliated with or endorsed by ECCouncil.
Question 1 of 50
A security strategy in which several protection layers are placed throughout an information system helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. What is this security strategy called?
    Correct Answer: B

Question 2 of 50
Which of the following attack allows attackers to bypass client-ID security mechanisms and gain access privileges, and then inject malicious scripts into specific web pages?
    Correct Answer: A

Question 3 of 50
The security of the network can be increased in a number of ways, for instance, by installing a special kind of web server and through packet filtering. What type of server is implemented as an intermediary server between a client and a server to act as a shield and protect and hide the computer from the outside network?
    Correct Answer: D

Question 4 of 50
An algorithm which is a part of the U.S. government's long-term project to develop a set of standards for publicly available cryptography as authorized by the Computer Security Act of 1987 accepts a message of 264 bits in length and a 160-bit message output digest is produced to complicate text searching. Which of the following algorithms is a family of two similar hash functions, with different block sizes, and uses 32-bit words and 64-bit words?
    Correct Answer: C

Question 5 of 50
Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?
    Correct Answer: D