Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-82 - Certified Cybersecurity Technician (CCT)

Page: 1 / 5
Total 161 questions

As a network security analyst for a video game development company, you are responsible for monitoring the traffic patterns on the development server used by programmers. During business hours, you notice a steady stream of data packets moving between the server and internal programmer workstations. Most of this traffic is utilizing TCP connections on port 22 (SSH) and port 5900 (VNC).

Based on this scenario, what does it describe?

A.

Traffic appears suspicious - The presence of encrypted connections might indicate attempts to conceal malicious activities.

B.

Traffic seems normal SSH and VNC are commonly used by programmers for secure remote access and collaboration.

C.

Traffic is because of malware infection - Frequently used SSH & VNC Ports could indicate malware spreading through the Network.

D.

The situation is inconclusive - Further investigation is necessary to determine the nature of the traffic.

Maisie. a new employee at an organization, was given an access badge with access to only the first and third floors of the organizational premises. Maisie Hied scanning her access badge against the badge reader at the second-floor entrance but was unsuccessful. Identify the short-range wireless communication technology used by the organization in this scenario.

A.

RFID

B.

Li-Fi

C.

Bluetooth

D.

Wi Fi

You have been assigned to perform a vulnerability assessment of a web server located at IP address 20.20.10.26. Identify the vulnerability with a severity score of &A. You can use the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password for this challenge. (Practical Question)

A.

TCP limestamps

B.

FTP Unencrypted Cleartext Login

C.

Anonymous FTP Login Reporting

D.

UDP limestamps

Cairo, an incident responder. was handling an incident observed in an organizational network. After performing all IH&R steps, Cairo initiated post-incident activities. He determined all types of losses caused by the incident by identifying And evaluating all affected devices, networks, applications, and software. Identify the post-incident activity performed by Cairo in this scenario.

A.

Incident impact assessment

B.

Close the investigation

C.

Review and revise policies

D.

Incident disclosure

An organization's risk management team identified the risk of natural disasters in the organization's current location. Because natural disasters cannot be prevented using security controls, the team suggested to build a new office in another location to eliminate the identified risk. Identify the risk treatment option suggested by the risk management team in this scenario.

A.

Risk modification

B.

Risk avoidance

C.

Risk sharing

D.

Risk retention

You work in a Multinational Company named Vector Inc. on Hypervisors and Virtualization Software. You are using the Operating System (OS) Virtualization and you have to handle the Security risks associated with the OS virtualization. How can you mitigate these security risks?

A.

All of the above

B.

Implement least privilege access control for users managing VMs.

C.

Regularly patch and update the hypervisor software for security fixes.

D.

Disable security features on virtual machines to improve performance.

A renowned research institute with a high-security wireless network recently encountered an advanced cyber attack. The attack was not detected by traditional security measures andresulted in significant data exfiltration. The wireless network was equipped with WPA3 encryption, MAC address filtering, and had disabled SSID broadcasting. Intriguingly. the attack occurred without any noticeable disruption or changes in network performance. After an exhaustive forensic analysis, the cybersecurity team pinpointed the attack method. Which of the following wireless network-specific attacks was most likely used?

A.

Jamming Attack, disrupting network communications with interference signals

B.

Evil Twin Attack, where a rogue access point mimics a legitimate one to capture network traffic

C.

Bluesnarfing. exploiting Bluetooth connections to access network data

D.

KRACK (Key Reinstallation Attack), exploiting vulnerabilities in the WPA2 protocol

An advanced persistent threat (APT) group known for Its stealth and sophistication targeted a leading software development company. The attack was meticulously planned and executed over several months. It involved exploiting vulnerabilities at both the application level and the operating system level. The attack resulted in the extraction of sensitive source code anddisruption of development operations. Post-incident analysis revealed multiple attack vectors, including phishing, exploitation of unknown/unpatched vulnerabilities in software/hardware. and lateral movement within the network. Given the nature and execution of this attack, what was the primary method used by the attackers to initiate this APT?

A.

Exploiting default passwords to gain initial access to the network.

B.

Exploiting a zero-day vulnerability in the application used by developers.

C.

Exploiting a known vulnerability in the firewall to bypass network defenses.

D.

Compromising a third-party vendor with access to the company's development environment.

MediData, a leading healthcare data analytics firm based in the US, has made significant strides in advance health diagnostics using Al. With a vast repository of patient data and seeing the potential market In Europ MediData plans to expand its services there. However, the leadership is wary. Europe's stringent data protects regulations require companies to adapt their data processing practices. The legal team at MediData is task; with ensuring compliance and minimizing potential litigation or penalties. As MediData plans its Europe; expansion, which regulatory framework should it be most concerned with?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Federal Information Security Management Act (FISMA)

C.

Sarbanes-Oxley Act

D.

European Union General Data Protection Regulation (GDPR)

An FTP server has been hosted in one of the machines in the network. Using Cain and Abel the attacker was able to poison the machine and fetch the FTP credentials used by the admin. You're given a task to validate the credentials that were stolen using Cain and Abel and read the file flag.txt

A.

white@hat

B.

red@hat

C.

hat@red

D.

blue@hat