New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ECCouncil 212-82 Actual Questions

Page: 4 / 11
Question 16

You work in a Multinational Company named Vector Inc. on Hypervisors and Virtualization Software. You are using the Operating System (OS) Virtualization and you have to handle the Security risks associated with the OS virtualization. How can you mitigate these security risks?

Options:

A.

All of the above

B.

Implement least privilege access control for users managing VMs.

C.

Regularly patch and update the hypervisor software for security fixes.

D.

Disable security features on virtual machines to improve performance.

Question 17

Kaison. a forensic officer, was investigating a compromised system used for various online attacks. Kaison initiated the data acquisition process and extracted the data from the systems DVD-ROM. Which of the following types of data did Kaison acquire in the above scenario?

Options:

A.

Archival media

B.

Kernel statistics

C.

ARP cache

D.

Processor cache

Question 18

You are the chief cybersecurity officer at a multi-national corporation, which specializes in satellite-based communication systems. Recently, you transitioned to a more advanced system architecture that includes multiple ground stations globally. These stations synchronize and communicate via a central hub that manages the distribution of encrypted data across the network. Upon reviewing the quarterly network logs, you uncover a series of sophisticated intrusions. These intrusions are intermittently taking place inground stations located in three continents. Evidence suggests that these attacks are coordinated, aiming to map out the network's communication paths, likely in preparation for a much larger scale cyber-attack. Further investigation uncovers small pockets of malware within the system, specifically designed to circumvent your current security controls. Given the criticality of ensuring uninterrupted satellite communication, which countermeasure would be most effective in thwarting these intrusions, ensuring data integrity, and maintaining the operational status of your satellite communication systems?

Options:

A.

Enhance end-point security solutions at each ground station, focusing on advanced malware detection, eradication, and prevention.

B.

Implement air-gapped systems for each ground station to ensure complete isolation, minimizing the risk of malware spread and external intrusions.

C.

Deploy an advanced network segmentation strategy, ensuring each ground station operates in a micro-segmented environment, with real-time threat monitoring and dynamic policy adjustments.

D.

Rollback the system to its previous architecture, while launching a thorough investigation into the identified intrusions and taking the necessary legal actions.

Question 19

A web application, was found to be prone to SQL injection attacks. You are tasked to exploit the web application and fetch the user data. Identify the contact number (Contact) of a user, Steve, in the moviescope database. Note: You already have an account on the web application, and your credentials are sam/test. (Practical Question)

Options:

A.

1-202-509-7316

B.

1-202-509-7432

C.

01-202-509-7364

D.

1-202-509-8421

Page: 4 / 11
Exam Code: 212-82
Exam Name: Certified Cybersecurity Technician (CCT)
Last Update: Dec 22, 2024
Questions: 161
212-82 pdf

212-82 PDF

$25.5  $84.99
212-82 Engine

212-82 Testing Engine

$28.5  $94.99
212-82 PDF + Engine

212-82 PDF + Testing Engine

$40.5  $134.99