EC-Council 212-82 Certified Cybersecurity Technician(C|CT) Online Training
EC-Council 212-82 Online Training
The questions for 212-82 were last updated at Nov 22,2024.
- Exam Code: 212-82
- Exam Name: Certified Cybersecurity Technician(C|CT)
- Certification Provider: EC-Council
- Latest update: Nov 22,2024
Richards, a security specialist at an organization, was monitoring an IDS system. While monitoring, he suddenly received an alert of an ongoing intrusion attempt on the organization’s network. He immediately averted the malicious actions by implementing the necessary measures. Identify the type of alert generated by the IDS system in the above scenario.
- A . True positive
- B . True negative
- C . False negative
- D . False positive
Karter, a security professional, deployed a honeypot on the organization’s network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as the applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to pre-configured commands. Identify the type of Honeypot deployed by Karter in the above scenario.
- A . Low-interaction honeypot
- B . Pure honeypot
- C . Medium-interaction honeypot
- D . High-interaction honeypot
An MNC hired Brandon, a network defender, to establish secured VPN communication between the company’s remote offices. For this purpose, Brandon employed a VPN topology where all the remote offices communicate with the corporate office but communication between the remote offices is denied.
Identify the VPN topology employed by Brandon in the above scenario.
- A . Point-to-Point VPN topology
- B . Star topology
- C . Hub-and-Spoke VPN topology
- D . Full-mesh VPN topology
Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization’s network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs. Identify the type of threat-hunting method employed by Mark in the above scenario.
- A . Entity-driven hunting
- B . TTP-driven hunting
- C . Data-driven hunting
- D . Hybrid hunting
An organization hired a network operations center (NOC) team to protect its IT infrastructure from external attacks. The organization utilized a type of threat intelligence to protect its resources from evolving threats. The threat intelligence helped the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors.
Identify the type of threat intelligence consumed by the organization in the above scenario.
- A . Operational threat intelligence
- B . Strategic threat intelligence
- C . Technical threat intelligence
- D . Tactical threat intelligence
Tristan, a professional penetration tester, was recruited by an organization to test its network infrastructure. The organization wanted to understand its current security posture and its strength in defending against external threats. For this purpose, the organization did not provide any information about their IT infrastructure to Tristan. Thus, Tristan initiated zero-knowledge attacks, with no information or assistance from the organization.
Which of the following types of penetration testing has Tristan initiated in the above scenario?
- A . Black-box testing
- B . White-box testing
- C . Gray-box testing
- D . Translucent-box testing
Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application’s data.
Which of the following secure application design principles was not met by the application in the above scenario?
- A . Secure the weakest link
- B . Do not trust user input
- C . Exception handling
- D . Fault tolerance
A software company is developing a new software product by following the best practices for secure application development. Dawson, a software analyst, is checking the performance of the application on the client’s network to determine whether end users are facing any issues in accessing the application.
Which of the following tiers of a secure application development lifecycle involves checking the performance of the application?
- A . Development
- B . Testing
- C . Quality assurance (QA)
- D . Staging
Nicolas, a computer science student, decided to create a guest OS on his laptop for different lab operations. He adopted a virtualization approach in which the guest OS will not be aware that it is running in a virtualized environment. The virtual machine manager (VMM) will directly interact with the computer hardware, translate commands to binary instructions, and forward them to the host OS.
Which of the following virtualization approaches has Nicolas adopted in the above scenario?
- A . Hardware-assisted virtualization
- B . Full virtualization
- C . Hybrid virtualization
- D . OS-assisted virtualization
Walker, a security team member at an organization, was instructed to check if a deployed cloud service is working as expected. He performed an independent examination of cloud service controls to verify adherence to standards through a review of objective evidence. Further, Walker evaluated the services provided by the CSP regarding security controls, privacy impact, and performance. Identify the role played by Walker in the above scenario.
- A . Cloud auditor
- B . Cloud provider
- C . Cloud carrier
- D . Cloud consumer