New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSS Exam - Topic 5 Question 29 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 29
Topic #: 5
[All ECSS Questions]

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.

The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Salome
4 months ago
Footprinting is important too, but it seems he missed the basics.
upvoted 0 times
...
Deeann
4 months ago
Port scanning is essential, but covering tracks is key!
upvoted 0 times
...
Malcom
4 months ago
Wait, he didn't even do a vulnerability assessment? That's surprising!
upvoted 0 times
...
Marylin
4 months ago
Totally agree, that's a rookie mistake!
upvoted 0 times
...
Christiane
5 months ago
Jason should've covered his tracks better.
upvoted 0 times
...
Latia
5 months ago
I vaguely recall that foot printing is crucial for gathering information before an attack, but I don't think it directly relates to how he got caught this time.
upvoted 0 times
...
Hershel
5 months ago
I'm not entirely sure, but I feel like if he had done a proper vulnerability assessment, he could have avoided detection.
upvoted 0 times
...
Glenna
5 months ago
I think I came across a similar question about not leaving traces after an attack. It seems like Jason really messed up by not covering his tracks.
upvoted 0 times
...
Elfriede
5 months ago
I remember studying about the importance of covering tracks in ethical hacking. If Jason had done that, he might not have been caught so easily.
upvoted 0 times
...
Lorean
5 months ago
The mnemonic is a nice memory aid, but I'm more interested in understanding the underlying logic behind the order of operations. That will help me apply it more flexibly.
upvoted 0 times
...
Jeanice
5 months ago
I'm a bit confused by this question. The options don't seem to match up perfectly with the description. I'll have to re-read it a few times and see if I can figure out the best answer.
upvoted 0 times
...
Ronald
5 months ago
Ah, I remember learning about this in class. I think the strategy we want to use is presenting the learner with a variety of exemplars, not just a limited set. That should help them generalize the response more effectively.
upvoted 0 times
...

Save Cancel