Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

212-82 Exam Dumps - ECCouncil Cyber Technician (CCT) Questions and Answers

Question # 24

Tenda, a network specialist at an organization, was examining logged data using Windows Event Viewer to identify attempted or successful unauthorized activities. The logs analyzed by Tenda include events related to Windows security; specifically, log-on/log-off activities, resource access, and also information based on Windows system's audit policies.

Identify the type of event logs analyzed by Tenda in the above scenario.

Options:

A.

Application event log

B.

Setup event log

C.

Security event log

D.

System event log

Buy Now
Question # 25

A text file containing sensitive information about the organization has been leaked and modified to bring down the reputation of the organization. As a safety measure, the organization did contain the MD5 hash of the original file. The file which has been leaked is retained for examining the integrity. A file named "Sensitiveinfo.txt" along with OriginalFileHash.txt has been stored in a folder named Hash in Documents of Attacker Machine-1. Compare the hash value of the original file with the leaked file and state whether the file has been modified or not by selecting yes or no.

Options:

A.

No

B.

Yes

Buy Now
Question # 26

You are working as a Security Consultant for a top firm named Beta Inc.

Being a Security Consultant, you are called in to assess your company's situation after a ransomware attack that encrypts critical data on Beta Inc. servers. What is the MOST critical action you have to take immediately after identifying the attack?

Options:

A.

Identify and isolate infected devices to prevent further spread.

B.

Restore critical systems from backups according to the BCP.

C.

Analyze the attack vector to identify the source of the infection.

D.

Pay the ransom demand to regain access to encrypted data.

Buy Now
Question # 27

A government agency's confidential Information is leaked to the public, causing significant embarrassment and damage to its reputation. The leaked data includes sensitive documents related to military operations and diplomatic communications. Considering the scenario, which threat actor group is typically employed by governments to penetrate and gather top-secret information from other government or military organizations?

Options:

A.

Criminal syndicates

B.

Industrial spies

C.

State-sponsored hackers

D.

Script Kiddies

Buy Now
Question # 28

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.

Identify the detection method employed by the IDS solution in the above scenario.

Options:

A.

Not-use detection

B.

Protocol anomaly detection

C.

Anomaly detection

D.

Signature recognition

Buy Now
Question # 29

An FTP server has been hosted in one of the machines in the network. Using Cain and Abel the attacker was able to poison the machine and fetch the FTP credentials used by the admin. You're given a task to validate the credentials that were stolen using Cain and Abel and read the file flag.txt

Options:

A.

white@hat

B.

red@hat

C.

hat@red

D.

blue@hat

Buy Now
Question # 30

Kason, a forensic officer, was appointed to investigate a case where a threat actor has bullied certain children online. Before proceeding legally with the case, Kason has documented all the supporting documents, including source of the evidence and its relevance to the case, before presenting it in front of the jury.

Which of the following rules of evidence was discussed in the above scenario?

Options:

A.

Authentic

B.

Understandable

C.

Reliable

D.

Admissible

Buy Now
Question # 31

A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wirelesstechnology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.

Which of the following technologies has the software company implemented in the above scenario?

Options:

A.

WiMAX

B.

RFID

C.

Bluetooth

D.

Wi-Fi

Buy Now
Question # 32

Desmond, a forensic officer, was investigating a compromised machine involved in various online attacks. For this purpose. Desmond employed a forensic tool to extract and analyze computer-based evidence to retrieve information related to websitesaccessed from the victim machine. Identify the computer-created evidence retrieved by Desmond in this scenario.

Options:

A.

Cookies

B.

Documents

C.

Address books

D.

Compressed files

Buy Now
Question # 33

Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.

Identify the remote authentication protocol employed by Lorenzo in the above scenario.

Options:

A.

SNMPv3

B.

RADIUS

C.

POP3S

D.

IMAPS

Buy Now
Exam Code: 212-82
Exam Name: Certified Cybersecurity Technician (CCT)
Last Update: Feb 23, 2025
Questions: 161
212-82 pdf

212-82 PDF

$25.5  $84.99
212-82 Engine

212-82 Testing Engine

$28.5  $94.99
212-82 PDF + Engine

212-82 PDF + Testing Engine

$40.5  $134.99