Pass the ECCouncil Cyber Technician (CCT) 212-82 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

Alpha Finance, a leading banking institution, is launching anew mobile banking app. Given the sensitive financial data involved, it wants to ensure that Its application follows the best security practices. As the primary recommendation, which guideline should Alpha Finance prioritize?

Options:

A.

Embedding an antivirus within the app


B.

Employing multi-factor authentication (MFA) for user logins


C.

Providing an in-app VPN for secure transactions


D.

Encouraging users to update to the latest version of their OS


Expert Solution
Questions # 42:

Grace, an online shopping enthusiast, purchased a smart TV using her debit card. During online payment. Grace's browser redirected her from the e-commerce website to a third-party payment gateway, where she provided her debit card details and the OTP received on her registered mobile phone. After completing the transaction, Grace logged Into her online bank account and verified the current balance in her savings account, identify the state of data being processed between the e-commerce website and payment gateway in the above scenario.

Options:

A.

Data in inactive


B.

Data in transit


C.

Data in use


D.

Data at rest


Expert Solution
Questions # 43:

You are working as a Security Consultant for a top firm named Beta Inc.

Being a Security Consultant, you are called in to assess your company's situation after a ransomware attack that encrypts critical data on Beta Inc. servers. What is the MOST critical action you have to take immediately after identifying the attack?

Options:

A.

Identify and isolate infected devices to prevent further spread.


B.

Restore critical systems from backups according to the BCP.


C.

Analyze the attack vector to identify the source of the infection.


D.

Pay the ransom demand to regain access to encrypted data.


Expert Solution
Questions # 44:

A software company is developing a new software product by following the best practices for secure application development. Dawson, a software analyst, is checkingthe performance of the application on the client's network to determine whether end users are facing any issues in accessing the application.

Which of the following tiers of a secure application development lifecycle involves checking the performance of the application?

Options:

A.

Development


B.

Testing


C.

Quality assurance (QA)


D.

Staging


Expert Solution
Questions # 45:

Shawn, a forensic officer, was appointed to investigate a crime scene that had occurred at a coffee shop. As a part of investigation, Shawn collected the mobile device from the victim, which may contain potential evidence to identify the culprits.

Which of the following points must Shawn follow while preserving the digital evidence? (Choose three.)

Options:

A.

Never record the screen display of the device


B.

Turn the device ON if it is OFF


C.

Do not leave the device as it is if it is ON


D.

Make sure that the device is charged


Expert Solution
Questions # 46:

A large-scale financial Institution was targeted by a sophisticated cyber-attack that resulted In substantial data leakage and financial loss. The attack was unique in its execution, involving multiple stages and techniques that evaded traditional security measures. The institution's cybersecurity team, in their post-incident analysis, discovered that the attackers followed a complex methodology aligning with a well-known hacking framework. Identifying the framework used by the attackers is crucial for the institution to revise its defense strategies. Which of the following hacking frameworks/methodologles most likely corresponds to the attack pattern observed?

Options:

A.

MITRE ATT&CK, encompassing a wide range of tactics and techniques used in real-world attacks


B.

OWASP Top Ten. focusing on web application security risks


C.

ISO/IEC 27001. focusing on information security management systems


D.

NIST Cybersecurity Framework, primarily used for managing cybersecurity risks


Expert Solution
Questions # 47:

Gideon, a forensic officer, was examining a victim's Linux system suspected to be involved in online criminal activities. Gideon navigated to a directory containing a log file that recorded information related to user login/logout. This information helped Gideon to determine the current login state of cyber criminals in the victim system, identify the Linux log file accessed by Gideon in this scenario.

Options:

A.

/va r/l og /mysq Id. log


B.

/va r/l og /wt m p


C.

/ar/log/boot.iog


D.

/var/log/httpd/


Expert Solution
Questions # 48:

Ruben, a crime investigator, wants to retrieve all the deleted files and folders in the suspected media without affecting the original files. For this purpose, he uses a method that involves the creation of a cloned copy of the entire media and prevents the contamination of the original media.

Identify the method utilized by Ruben in the above scenario.

Options:

A.

Sparse acquisition


B.

Bit-stream imaging


C.

Drive decryption


D.

Logical acquisition


Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions