New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Newly Released ECCouncil 212-82 Exam PDF

Page: 2 / 11
Question 8

You are working as a Security Consultant for a top firm named Beta Inc.

Being a Security Consultant, you are called in to assess your company's situation after a ransomware attack that encrypts critical data on Beta Inc. servers. What is the MOST critical action you have to take immediately after identifying the attack?

Options:

A.

Identify and isolate infected devices to prevent further spread.

B.

Restore critical systems from backups according to the BCP.

C.

Analyze the attack vector to identify the source of the infection.

D.

Pay the ransom demand to regain access to encrypted data.

Question 9

Tenda, a network specialist at an organization, was examining logged data using Windows Event Viewer to identify attempted or successful unauthorized activities. The logs analyzed by Tenda include events related to Windows security; specifically, log-on/log-off activities, resource access, and also information based on Windows system's audit policies.

Identify the type of event logs analyzed by Tenda in the above scenario.

Options:

A.

Application event log

B.

Setup event log

C.

Security event log

D.

System event log

Question 10

A text file containing sensitive information about the organization has been leaked and modified to bring down the reputation of the organization. As a safety measure, the organization did contain the MD5 hash of the original file. The file which has been leaked is retained for examining the integrity. A file named "Sensitiveinfo.txt" along with OriginalFileHash.txt has been stored in a folder named Hash in Documents of Attacker Machine-1. Compare the hash value of the original file with the leaked file and state whether the file has been modified or not by selecting yes or no.

Options:

A.

No

B.

Yes

Question 11

Giovanni, a system administrator, was tasked with configuring permissions for employees working on a new project. Hit organization used active directories (ADs) to grant/deny permissions to resources Giovanni created a folder for AD users with the required permissions and added all employees working on the new project in it. Identify the type of account created by Giovanni in this scenario.

Options:

A.

Third-party account

B.

Croup-based account

C.

Shared account

D.

Application account

Page: 2 / 11
Exam Code: 212-82
Exam Name: Certified Cybersecurity Technician (CCT)
Last Update: Dec 22, 2024
Questions: 161
212-82 pdf

212-82 PDF

$25.5  $84.99
212-82 Engine

212-82 Testing Engine

$28.5  $94.99
212-82 PDF + Engine

212-82 PDF + Testing Engine

$40.5  $134.99