EC-Council 212-82 Certified Cybersecurity Technician(C|CT) Online Training
EC-Council 212-82 Online Training
The questions for 212-82 were last updated at Nov 23,2024.
- Exam Code: 212-82
- Exam Name: Certified Cybersecurity Technician(C|CT)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Ryleigh, a system administrator, was instructed to perform a full back up of organizational data on a regular basis. For this purpose, she used a backup technique on a fixed date when the employees are not accessing the system i.e., when a service-level down time is allowed a full backup is taken. Identify the backup technique utilized by Ryleigh in the above scenario.
- A . Nearline backup
- B . Cold backup
- C . Hot backup
- D . Warm backup
Jaden, a network administrator at an organization, used the ping command to check the status of a
system connected to the organization’s network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.
Identify the type of ICMP error message received by Jaden in the above scenario.
- A . Type =12
- B . Type = 8
- C . Type = 5
- D . Type = 3
Steve, a network engineer, was tasked with troubleshooting a network issue that is causing unexpected packet drops. For this purpose, he employed a network troubleshooting utility to capture the ICMP echo request packets sent to the server. He identified that certain packets are dropped at the gateway due to poor network connection.
Identify the network troubleshooting utility employed by Steve in the above scenario.
- A . dnsenurn
- B . arp
- C . traceroute
- D . ipconfig
Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization’s network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit. Identify the type of attack signature analysis performed by Anderson in the above scenario.
- A . Context-based signature analysis
- B . Atomic-signature-based analysis
- C . Composite-signature-based analysis
- D . Content-based signature analysis
Leilani, a network specialist at an organization, employed Wireshark for observing network traffic. Leilani navigated to the Wireshark menu icon that contains items to manipulate, display and apply filters, enable, or disable the dissection of protocols, and configure user-specified decodes. Identify the Wireshark menu Leilani has navigated in the above scenario.
- A . Statistics
- B . Capture
- C . Main toolbar
- D . Analyze