Pass the ECCouncil Cyber Technician (CCT) 212-82 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

DigitalVault Corp., a premier financial institution, has recently seen a significant rise in advanced persistent threats (APTs)targetlng Its mainframe systems. Considering the sensitivity of the data stored, It wants to employ a strategy that deceives attackers into revealing their techniques. As part of its defense strategy, the cybersecurity team is deliberating over-deploying a honeypot system. Given the bank's requirements, the team are evaluating different types of honeypots. DigitalVault's primary goal Is to gather extensive Information about the attackers' methods without putting its actual systems at risk. Which of the following honeypots would BEST serve DigitalVault’s intent?

Options:

A.

High-interaction honeypots, offering a real system's replica for attackers, and observing their every move.


B.

Low-interaction honeypots, designed to log basic information such as IP addresses and attack vectors.


C.

Reserch honeypots, aimed at understanding threats to a specific industry and sharing insights with the broader community.


D.

Production honeypots, which are part of the organization's active network and collect information about dally attacks.


Expert Solution
Questions # 12:

Stephen, a security professional at an organization, was instructed to implement security measures that prevent corporate data leakage on employees' mobile devices. For this purpose, he employed a technique using which all personal and corporate data are isolated on an employee's mobile device. Using this technique, corporate applications do not have any control of or communication with the private applications or data of the employees.

Which of the following techniques has Stephen implemented in the above scenario?

Options:

A.

Full device encryption


B.

Geofencing


C.

Containerization


D.

OTA updates


Expert Solution
Questions # 13:

PolarFin. a global finance institution, is in the process of migrating to a new transactional system. Given the sensitivity of financial data and international regulations it adheres to. PolarFin needs an encryption algorithm that provides strong security and Is also widely accepted Internationally. The algorithm should also support both encryption and decryption functions. Which cryptographic algorithm should PolarFin consider as its primary choice for this transition?

Options:

A.

HMAC (Hash-Based Message Authentication Code)


B.

RSA (Rivest Shamir Adleman)


C.

DES (Data Encryption Standard)


D.

Blowfish


Expert Solution
Questions # 14:

TechTonic, a leading software solution provider, is incorporating stringent cybersecurity measures for their Windows-based server farm. Recently, it noticed a series of unauthorized activities within its systems but could not trace back tot he origins. The company Intends to bolster Its monitoring capabilities by comprehensively analyzing Windows system logs. Which strategy should TechTonic prioritize to gain an insightful and effective analysis of its Windows logs, aiming to trace potential intrusions?

Options:

A.

Implement a centralized logging server and analyze logs using pattern-detection algorithms.


B.

Set up monitoring only for Windows Event Log IDs commonly associated with security breaches.


C.

Routinely back up logs every week and conduct a monthly manual review to detect anomalies.


D.

Focus solely on logs from critical servers, assuming other logs are less consequential.


Expert Solution
Questions # 15:

As the senior network analyst for a leading fintech organization, you have been tasked with ensuring seamless communication between the firm's global offices. Your network has been built with redundancy in mind, leveraging multiple service providers and a mixture of MPLS and public internet connections.

Options:

A.

One week after deploying a state-of-the-art Network Performance Monitoring & Diagnostics (NPMD) tool, you notice unusual traffic patterns originating from your European data center and targeting the corporate headquarters in New York. The traffic spikes periodically, heavilyutilizing the MPLS link and sometimes saturating the public internet connection, resulting in significant data packet losses and application failures. Your task is to id


B.

MPLS Link Flapping The MPLS link might be experiencing flapping, leading to inconsistent traffic flow. It is crucial to liaise with the MPLS service provider to inspect the link stability and consider a backup link or an alternate route to reroute the traffic.


C.

Unauthorized Application Usage The European data center staff might be using unauthorized applications or services that are consuming massive bandwidth. You should enforce strict Application and Network Access Control policies, and scrutinize the application traffic to restrict non business-critical applications.


D.

Data Backup and Replication The European data center might be running data backup or replication processes during peak business hours. You should liaise with the data center team to reschedule backup operations to non-peak hours and ensure that backup processes are bandwidth-aware.

Faulty Network Hardware The network hardware in the European data center, such as routers or switches, might be malfunctioning, causing inconsistent traffi


Expert Solution
Questions # 16:

George, a security professional at an MNC, implemented an Internet access policy that allowed employees working from a remote location to access any site, download anyapplication, and access any computer or network without any restrictions. Identify the type of Internet access policy implemented by George in this scenario.

Options:

A.

Permissive policy


B.

Paranoid policy


C.

Prudent policy


D.

Promiscuous policy


Expert Solution
Questions # 17:

A disgruntled employee transferred highly confidential tender data of upcoming projects as an encoded text. You are assigned to decode the text file snitch.txt located in the Downloads folder of the Attacker Machined and determine the value of the greenfarm project in dollars. Hint 1: All the cryptography tools are located at "Z:\CCT-Tools\CCT Module 14 Cryptography". Hint 2: If required, you can use sniffer@123 as the password to decode the file. (Practical Question)

Options:

A.

9S000


B.

36000


C.

80000


D.

75000


Expert Solution
Questions # 18:

A software team at an MNC was involved in a project aimed at developing software that could detect the oxygen levels of a person without physical contact, a helpful solution for pandemic situations. For this purpose, the team used a wireless technology that could digitally transfer data between two devices within a short range of up to 5 m and only worked in the absence of physical blockage or obstacle between the two devices, identify the technology employed by the software team in the above scenario.

Options:

A.

Infrared


B.

USB


C.

CPS


D.

Satcom


Expert Solution
Questions # 19:

Giovanni, a system administrator, was tasked with configuring permissions for employees working on a new project. Hit organization used active directories (ADs) to grant/deny permissions to resources Giovanni created a folder for AD users with the required permissions and added all employees working on the new project in it. Identify the type of account created by Giovanni in this scenario.

Options:

A.

Third-party account


B.

Croup-based account


C.

Shared account


D.

Application account


Expert Solution
Questions # 20:

Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.

Identify the type of ICMP error message received by Jaden in the above scenario.

Options:

A.

Type =12


B.

Type = 8


C.

Type = 5


D.

Type = 3


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions