EC-Council 212-82 Certified Cybersecurity Technician(C|CT) Online Training
EC-Council 212-82 Online Training
The questions for 212-82 were last updated at Nov 22,2024.
- Exam Code: 212-82
- Exam Name: Certified Cybersecurity Technician(C|CT)
- Certification Provider: EC-Council
- Latest update: Nov 22,2024
A software company has implemented a wireless technology to track the employees’ attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wireless technology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.
Which of the following technologies has the software company implemented in the above scenario?
- A . WiMAX
- B . RFID
- C . Bluetooth
- D . Wi-Fi
Matias, a network security administrator at an organization, was tasked with the implementation of secure wireless network encryption for their network. For this purpose, Matias employed a security solution that uses 256-bit Galois/Counter Mode Protocol (GCMP-256) to maintain the authenticity and confidentiality of data.
Identify the type of wireless encryption used by the security solution employed by Matias in the above scenario.
- A . WPA2 encryption
- B . WPA3 encryption
- C . WEP encryption
- D . WPA encryption
Rickson, a security professional at an organization, was instructed to establish short-range communication between devices within a range of 10 cm. For this purpose, he used a mobile connection method that employs electromagnetic induction to enable communication between devices. The mobile connection method selected by Rickson can also read RFID tags and establish Bluetooth connections with nearby devices to exchange information such as images and contact lists.
Which of the following mobile connection methods has Rickson used in above scenario?
- A . NFC
- B . Satcom
- C . Cellular communication
- D . ANT
Stephen, a security professional at an organization, was instructed to implement security measures that prevent corporate data leakage on employees’ mobile devices. For this purpose, he employed a technique using which all personal and corporate data are isolated on an employee’s mobile device. Using this technique, corporate applications do not have any control of or communication with the private applications or data of the employees.
Which of the following techniques has Stephen implemented in the above scenario?
- A . Full device encryption
- B . Geofencing
- C . Containerization
- D . OTA updates
Leo has walked to the nearest supermarket to purchase grocery. At the billing section, the billing executive scanned each product’s machine-readable tag against a readable machine that automatically reads the product details, displays the prices of the individual product on the computer, and calculates the sum of those scanned items. Upon completion of scanning all the products, Leo has to pay the bill.
Identify the type of short-range wireless communication technology that the billing executive has used in the above scenario.
- A . Radio-frequency identification (RFID)
- B . Near-field communication (NFC)
- C . QUIC
- D . QR codes and barcodes
Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks. Identify the security control implemented by Hayes in the above scenario.
- A . Point-to-po int communication
- B . MAC authentication
- C . Anti-DoS solution
- D . Use of authorized RTU and PLC commands
Paul, a computer user, has shared information with his colleague using an online application. The online application used by Paul has been incorporated with the latest encryption mechanism. This mechanism encrypts data by using a sequence of photons that have a spinning trait while traveling from one end to another, and these photons keep changing their shapes during their course through filters: vertical, horizontal, forward slash, and backslash.
Identify the encryption mechanism demonstrated in the above scenario.
- A . Quantum cryptography
- B . Homomorphic encryption
- C . Rivest Shamir Adleman encryption
- D . Elliptic curve cryptography
Riley sent a secret message to Louis. Before sending the message, Riley digitally signed the message using his private key. Louis received the message, verified the digital signature using the corresponding key to ensure that the message was not tampered during transit.
Which of the following keys did Louis use to verify the digital signature in the above scenario?
- A . Riley’s public key
- B . Louis’s public key
- C . Riley’s private key
- D . Louis’s private key
Grace, an online shopping freak, has purchased a smart TV using her debit card. During online payment, Grace’s browser redirected her from ecommerce website to a third-party payment gateway, where she provided her debit card details and OTP received on her registered mobile phone. After completing the transaction, Grace navigated to her online bank account and verified the current balance in her savings account.
Identify the state of data when it is being processed between the ecommerce website and the payment gateway in the above scenario.
- A . Data at rest
- B . Data in inactive
- C . Data in transit
- D . Data in use
Andre, a security professional, was tasked with segregating the employees’ names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?
- A . Tokenization
- B . Masking
- C . Hashing
- D . Bucketing