Pass the ECCouncil Cyber Technician (CCT) 212-82 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

Galactic Innovations, an emerging tech start-up. Is developing a proprietary software solution that will be hosted on a cloud platform. The software, designed for real-time communication and collaboration, aims to cater to global users, including top-tier businesses. As the software grows in complexity, the company recognizes the need for a comprehensive security standard that aligns with global best practices. The Intention is to enhance trustworthiness among potential clients and ensure that the application meets industry-accepted criteria, particularly in the face of increasing cyberthreats. Considering the company's requirements and the international nature of its user base, which software security standard, model, or framework should Galactic Innovations primarily focus on adopting?

Options:

A.

ISAS


B.

QlSO/IEC 27001:2013


C.

GCSP


D.

USAM


Expert Solution
Questions # 32:

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.

Identify the detection method employed by the IDS solution in the above scenario.

Options:

A.

Not-use detection


B.

Protocol anomaly detection


C.

Anomaly detection


D.

Signature recognition


Expert Solution
Questions # 33:

A text file containing sensitive information about the organization has been leaked and modified to bring down the reputation of the organization. As a safety measure, the organization did contain the MD5 hash of the original file. The file which has been leaked is retained for examining the integrity. A file named "Sensitiveinfo.txt" along with OriginalFileHash.txt has been stored in a folder named Hash in Documents of Attacker Machine-1. Compare the hash value of the original file with the leaked file and state whether the file has been modified or not by selecting yes or no.

Options:

A.

No


B.

Yes


Expert Solution
Questions # 34:

Malachi, a security professional, implemented a firewall in his organization to trace incoming and outgoing traffic. He deployed a firewall that works at the session layer of the OSI model and monitors the TCP handshake between hosts to determine whether a requested session is legitimate.

Identify the firewall technology implemented by Malachi in the above scenario.

Options:

A.

Next generation firewall (NGFW)


B.

Circuit-level gateways


C.

Network address translation (NAT)


D.

Packet filtering


Expert Solution
Questions # 35:

An organization's risk management team identified the risk of natural disasters in the organization's current location. Because natural disasters cannot be prevented using security controls, the team suggested to build a new office in another location to eliminate the identified risk. Identify the risk treatment option suggested by the risk management team in this scenario.

Options:

A.

Risk modification


B.

Risk avoidance


C.

Risk sharing


D.

Risk retention


Expert Solution
Questions # 36:

Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.

Which of the following types of accounts the organization has given to Sam in the above scenario?

Options:

A.

Service account


B.

Guest account


C.

User account


D.

Administrator account


Expert Solution
Questions # 37:

In a multinational corporation, the IT department Implemented a new network security protocol for their global data centers. This protocol was designed to enhance security measures by incorporating advanced access control principles. The protocol employs a combination of methods to ensure that only authorized personnel can access sensitive data. Recently, an incident occurred where an unauthorized user gained access to confidential data. The securityteam discovered that the intruder exploited a specific aspect of the access control system. Which aspect of the access control principles, terminologies, and models was most likely exploited?

Options:

A.

Attribute-Based Access Control {ABAC), where access decisions are made based on a set of policies and attributes.


B.

Discretionary Access Control (DAC). where the resource owner decides on the access permissions.


C.

Role-Based Access Control (RBAC). where access is given based on the roles within the organization.


D.

Mandatory Access Control (MAC), where access decisions are made based on predefined rules set by the system s administrator.


Expert Solution
Questions # 38:

Ryleigh, a system administrator, was instructed to perform a full back up of organizational data on a regular basis. For this purpose, she used a backup technique on a fixed date when the employees are not accessing the system i.e., when a service-level down time is allowed a full backup is taken.

Identify the backup technique utilized by Ryleigh in the above scenario.

Options:

A.

Nearline backup


B.

Cold backup


C.

Hot backup


D.

Warm backup


Expert Solution
Questions # 39:

In an advancedcybersecurity research lab. a team Is working on developing a new cryptographicprotocol to secure highly sensitive communication. Their goal is to create aprotocol that is resilient against quantum computing attacks, which couldpotentially break many current encryption methods. During their research, theyfocus on the use of hash functions in their protocol. The team experiments withvarious hash functions to ensure the highest level of security. Considering thethreat of quantum computing, which of the following hash functions would be themost appropriate choice fortheir protocol?

Options:

A.

SHA-256, due to its widespread use and proven security track record


B.

MD5, for its speed and efficiency in generating hash values


C.

HMAC. for its ability to provide data integrity and authentication


D.

SHA-3. as it is designed to be resistant against quantum computing attacks


Expert Solution
Questions # 40:

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Options:

A.

Quid pro quo


B.

Diversion theft


C.

Elicitation


D.

Phishing


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions