Pass the ECCouncil Cyber Technician (CCT) 212-82 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Omar, an encryption specialist in an organization, was tasked with protecting low-complexity applications such as RFID tags, sensor-based applications, and other IbT-based applications. For this purpose, he employed

an algorithm for all lower-powered devices that used less power and resources without compromising device security.

identify the algorithm employed by Omar in this scenario.

Options:

A.

Quantum cryptography


B.

Elliptic curve cryptography


C.

Lightweight cryptography


D.

Homomorphic encryption


Questions # 2:

FinTech Corp, a financial services software provider, handles millions of transactions daily. To address recent breaches In other organizations. It Is reevaluating Its data security controls. It specifically needs a control that will not only provide real-time protection against threats but also assist in achieving compliance with global financial regulations. The company's primary goal is to safeguard sensitive transactional data without impeding system performance. Which of the following controls would be the most suitable for FinTech Corp's objectives?

Options:

A.

Switching to disk-level encryption for all transactional databases


B.

Implementing DLP (Data Loss Prevention) systems


C.

Adopting anomaly-based intrusion detection systems


D.

Enforcing Two-Factor Authentication for all database access


Questions # 3:

A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wirelesstechnology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.

Which of the following technologies has the software company implemented in the above scenario?

Options:

A.

WiMAX


B.

RFID


C.

Bluetooth


D.

Wi-Fi


Questions # 4:

An IoT device that has been placed in a hospital for safety measures, it has sent an alert command to the server. The network traffic has been captured and stored in the Documents folder of the Attacker Machine-1. Analyze the loTdeviceTraffic.pcapng file and select the appropriate command that was sent by the IoT device over the network.

Options:

A.

Tempe_Low


B.

Low_Tempe


C.

Temp_High


D.

High_Tempe


Questions # 5:

You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

Options:

A.

Reconnaissance


B.

Command and control


C.

Weaponization


D.

Exploitation


Questions # 6:

A global financial services firm Is revising its cybersecurity policies to comply with a diverse range of international regulatory frameworks and laws. The firm operates across multiple continents, each with distinct legal requirements concerning data protection, privacy, and cybersecurity. As part of their compliance strategy, they are evaluating various regulatory frameworks to determine which ones are most critical to their operations. Given the firm's international scope and the nature of its services, which of the following regulatory frameworks should be prioritized for compliance?

Options:

A.

ISO 27001 Information Security Management System


B.

ISO 27002 Code of Practice for information security controls


C.

Qceneral Data Protection Regulation (CDPR) - European Union


D.

NIST Cybersecurity Framework


Questions # 7:

Grace, an online shopping freak, has purchased a smart TV using her debit card. During online payment, Grace's browser redirected her from ecommerce website to a third-party payment gateway, where she provided her debit card details and OTP received on her registered mobile phone. After completing the transaction, Grace navigated to her online bank account and verified the current balance in her savings account.

Identify the state of data when it is being processed between the ecommerce website and the payment gateway in the above scenario.

Options:

A.

Data at rest


B.

Data in inactive


C.

Data in transit


D.

Data in use


Questions # 8:

Kason, a forensic officer, was appointed to investigate a case where a threat actor has bullied certain children online. Before proceeding legally with the case, Kason has documented all the supporting documents, including source of the evidence and its relevance to the case, before presenting it in front of the jury.

Which of the following rules of evidence was discussed in the above scenario?

Options:

A.

Authentic


B.

Understandable


C.

Reliable


D.

Admissible


Questions # 9:

Perform vulnerability assessment of an Android device located at IP address 172.30.20.110. Identify the severity score for the device. You can use the OpenVAS vulnerability scanner, available with Parrot Security, with credentials admln/password for this challenge. (Practical Question)

Options:

A.

2.2


B.

2.8


C.

02.6


D.

2.4


Questions # 10:

Thomas, an employee of an organization, is restricted from accessing specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.

Options:

A.

Vishing


B.

Eavesdropping


C.

Phishing


D.

Dumpster diving


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions