Pass4itsure > EC-COUNCIL > Cyber Technician (CCT) > 212-82 > 212-82 Online Practice Questions and Answers

212-82 Online Practice Questions and Answers

Questions 4

In an organization, all the servers and database systems are guarded in a sealed room with a single entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.

Which of the following types of physical locks is used by the organization in the above scenario?

A. Digital locks

B. Combination locks

C. Mechanical locks

D. Electromagnetic locks

Buy Now
Questions 5

RAT has been setup in one of the machines connected to the network to steal the important Sensitive corporate docs located on Desktop of the server, further investigation revealed the IP address of the server 20.20.10.26. Initiate a remote connection using thief client and determine the number of files present in the folder.

Hint: Thief folder is located at: Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Thief of Attacker Machine-1.

A. 2

B. 4

C. 3 D. 5

Buy Now
Questions 6

Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.

Identify the type of ICMP error message received by Jaden in the above scenario.

A. Type =12

B. Type = 8

C. Type = 5

D. Type = 3

Buy Now
Questions 7

Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat hunting process using existing data collected from DNS and proxy logs.

Identify the type of threat hunting method employed by Mark in the above scenario.

A. Entity-driven hunting

B. TTP-driven hunting

C. Data-driven hunting

D. Hybrid hunting

Buy Now
Questions 8

Warren, a member of IHandR team at an organization, was tasked with handling a malware attack launched on one of servers connected to the organization's network. He immediately implemented appropriate measures to stop the infection from spreading to other organizational assets and to prevent further damage to the organization.

Identify the IHandR step performed by Warren in the above scenario.

A. Containment

B. Recovery

C. Eradication

D. Incident triage

Buy Now
Questions 9

The IHandR team in an organization was handling a recent malware attack on one of the hosts connected to the organization's network. Edwin, a member of the IHandR team, was involved in reinstating lost data from the backup media. Before performing this step, Edwin ensured that the backup does not have any traces of malware.

Identify the IHandR step performed by Edwin in the above scenario.

A. Eradication

B. Incident containment

C. Notification

D. Recovery

Buy Now
Questions 10

Kayden successfully cracked the final round of interview at an organization. After few days, he received his offer letter through an official company email address. The email stated that the selected candidate should respond within a specified time. Kayden accepted the opportunity and provided e-signature on the offer letter, then replied to the same email address. The company validated the e-signature and added his details to their database. Here, Kayden could not deny company's message, and company could not deny Kayden's signature.

Which of the following information security elements was described in the above scenario?

A. Availability

B. Non-repudiation

C. Integrity

D. Confidentiality

Buy Now
Questions 11

You are Harris working for a web development company. You have been assigned to perform a task for vulnerability assessment on the given IP address 20.20.10.26. Select the vulnerability that may affect the website according to the severity factor.

Hint: Greenbone web credentials: admin/password

A. TCP timestamps

B. Anonymous FTP Login Reporting

C. FTP Unencrypted Cleartext Login

D. UDP timestamps

Buy Now
Questions 12

An IoT device that has been placed in a hospital for safety measures, it has sent an alert command to the server. The network traffic has been captured and stored in the Documents folder of the Attacker Machine-1. Analyze the loTdeviceTraffic.pcapng file and select the appropriate command that was sent by the IoT device over the network.

A. Tempe_Low

B. Low_Tempe

C. Temp_High

D. High_Tempe

Buy Now
Questions 13

A software company is developing a new software product by following the best practices for secure application development. Dawson, a software analyst, is checking the performance of the application on the client's network to determine whether end users are facing any issues in accessing the application.

Which of the following tiers of a secure application development lifecycle involves checking the performance of the application?

A. Development

B. Testing

C. Quality assurance (QA)

D. Staging

Buy Now
Exam Code: 212-82
Exam Name: Certified Cybersecurity Technician(C|CT)
Last Update: May 02, 2024
Questions: 102
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99