Certbus > EC-COUNCIL > Cyber Technician (CCT) > 212-82 > 212-82 Online Practice Questions and Answers

212-82 Online Practice Questions and Answers

Questions 4

Arabella, a forensic officer, documented all the evidence related to the case in a standard forensic investigation report template. She filled different sections of the report covering all the details of the crime along with the daily progress of the investigation process.

In which of the following sections of the forensic investigation report did Arabella record the "nature of the claim and information provided to the officers"?

A. Investigation process

B. Investigation objectives

C. Evidence information

D. Evaluation and analysis process

Browse 102 Q&As
Questions 5

In an organization, all the servers and database systems are guarded in a sealed room with a single entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.

Which of the following types of physical locks is used by the organization in the above scenario?

A. Digital locks

B. Combination locks

C. Mechanical locks

D. Electromagnetic locks

Browse 102 Q&As
Questions 6

Tenda, a network specialist at an organization, was examining logged data using Windows Event Viewer to identify attempted or successful unauthorized activities. The logs analyzed by Tenda include events related to Windows security; specifically, log-on/log-off activities, resource access, and also information based on Windows system's audit policies.

Identify the type of event logs analyzed by Tenda in the above scenario.

A. Application event log

B. Setup event log

C. Security event log

D. System event log

Browse 102 Q&As
Questions 7

Riley sent a secret message to Louis. Before sending the message, Riley digitally signed the message using his private key. Louis received the message, verified the digital signature using the corresponding key to ensure that the message was not tampered during transit.

Which of the following keys did Louis use to verify the digital signature in the above scenario?

A. Riley's public key

B. Louis's public key

C. Riley's private key

D. Louis's private key

Browse 102 Q&As
Questions 8

Cassius, a security professional, works for the risk management team in an organization. The team is responsible for performing various activities involved in the risk management process. In this process, Cassius was instructed to select and implement appropriate controls on the identified risks in order to address the risks based on their severity level.

Which of the following risk management phases was Cassius instructed to perform in the above scenario?

A. Risk analysis

B. Risk treatment

C. Risk prioritization

D. Risk identification

Browse 102 Q&As
Questions 9

Matias, a network security administrator at an organization, was tasked with the implementation of secure wireless network encryption for their network. For this purpose, Matias employed a security solution that uses 256-bit Galois/Counter Mode Protocol (GCMP-256) to maintain the authenticity and confidentiality of data.

Identify the type of wireless encryption used by the security solution employed by Matias in the above scenario.

A. WPA2 encryption

B. WPA3 encryption

C. WEP encryption

D. WPA encryption

Browse 102 Q&As
Questions 10

You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

A. Reconnaissance

B. Command and control

C. Weaponization

D. Exploitation

Browse 102 Q&As
Questions 11

Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.

Identify the security control implemented by Hayes in the above scenario.

A. Point-to-point communication

B. MAC authentication

C. Anti-DoS solution

D. Use of authorized RTU and PLC commands

Browse 102 Q&As
Exam Code: 212-82
Exam Name: Certified Cybersecurity Technician(C|CT)
Last Update: Apr 23, 2024
Questions: 102 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99