Certbus > EC-COUNCIL > EC-COUNCIL Certifications > 212-82 > 212-82 Online Practice Questions and Answers

212-82 Online Practice Questions and Answers

Questions 4

Ryleigh, a system administrator, was instructed to perform a full back up of organizational data on a regular basis. For this purpose, she used a backup technique on a fixed date when the employees are not accessing the system i.e., when a

service-level down time is allowed a full backup is taken.

Identify the backup technique utilized by Ryleigh in the above scenario.

A. Nearline backup

B. Cold backup

C. Hot backup

D. Warm backup

Browse 102 Q&As
Questions 5

Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.

Which of the following types of accounts the organization has given to Sam in the above scenario?

A. Service account

B. Guest account

C. User account

D. Administrator account

Browse 102 Q&As
Questions 6

Calvin spotted blazing flames originating from a physical file storage location in his organization because of a Short circuit. In response to the incident, he used a fire suppression system that helped curb the incident in the initial stage and prevented it from spreading over a large area. Which of the following firefighting systems did Calvin use in this scenario?

A. Fire detection system

B. Sprinkler system

C. Smoke detectors

D. Fire extinguisher

Browse 102 Q&As
Questions 7

A text file containing sensitive information about the organization has been leaked and modified to bring down the reputation of the organization. As a safety measure, the organization did contain the MD5 hash of the original file. The file which has been leaked is retained for examining the integrity. A file named "Sensitiveinfo.txt" along with OriginalFileHash.txt has been stored in a folder named Hash in Documents of Attacker Machine-1. Compare the hash value of the original file with the leaked file and state whether the file has been modified or not by selecting yes or no.

A. No

B. Yes

Browse 102 Q&As
Questions 8

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

A. Quid pro quo

B. Diversion theft

C. Elicitation

D. Phishing

Browse 102 Q&As
Questions 9

Gideon, a forensic officer, was examining a victim's Linux system suspected to be involved in online criminal activities. Gideon navigated to a directory containing a log file that recorded information related to user login/logout. This information helped Gideon to determine the current login state of cyber criminals in the victim system, identify the Linux log file accessed by Gideon in this scenario.

A. /va r/l og /mysq Id. log

B. /va r/l og /wt m p

C. /ar/log/boot.iog

D. /var/log/httpd/

Browse 102 Q&As
Questions 10

Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.

Identify the security control implemented by Hayes in the above scenario.

A. Point-to-po int communication

B. MAC authentication

C. Anti-DoS solution

D. Use of authorized RTU and PLC commands

Browse 102 Q&As
Questions 11

Kayden successfully cracked the final round of interviews at an organization. After a few days, he received his offer letter through an official company email address. The email stated that the selected candidate should respond within a specified time. Kayden accepted the opportunity and provided an e-signature on the offer letter, then replied to the same email address. The company validated the e-signature and added his details to their database. Here, Kayden could not deny the company's message, and the company could not deny Kayden's signature.

Which of the following information security elements was described in the above scenario?

A. Availability

B. Non-repudiation

C. Integrity

D. Confidentiality

Browse 102 Q&As
Questions 12

Paul, a computer user, has shared information with his colleague using an online application. The online application used by Paul has been incorporated with the latest encryption mechanism. This mechanism encrypts data by using a sequence of photons that have a spinning trait while traveling from one end to another, and these photons keep changing their shapes during their course through filters: vertical, horizontal, forward slash, and backslash.

Identify the encryption mechanism demonstrated in the above scenario.

A. Quantum cryptography

B. Homomorphic encryption

C. Rivest Shamir Adleman encryption

D. Elliptic curve cryptography

Browse 102 Q&As
Questions 13

Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.

Identify the remote authentication protocol employed by Lorenzo in the above scenario.

A. SNMPv3

B. RADIUS

C. POP3S

D. IMAPS

Browse 102 Q&As
Questions 14

Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.

Identify the type of ICMP error message received by Jaden in the above scenario.

A. Type =12

B. Type = 8

C. Type = 5

D. Type = 3

Browse 102 Q&As
Questions 15

Giovanni, a system administrator, was tasked with configuring permissions for employees working on a new project. Hit organization used active directories (ADs) to grant/deny permissions to resources Giovanni created a folder for AD users with the required permissions and added all employees working on the new project in it. Identify the type of account created by Giovanni in this scenario.

A. Third-party account

B. Croup-based account

C. Shared account

D. Application account

Browse 102 Q&As
Questions 16

Rickson, a security professional at an organization, was instructed to establish short-range communication between devices within a range of 10 cm. For this purpose, he used a mobile connection method that employs electromagnetic induction to enable communication between devices. The mobile connection method selected by Rickson can also read RFID tags and establish Bluetooth connections with nearby devices to exchange information such as images and contact lists.

Which of the following mobile connection methods has Rickson used in above scenario?

A. NFC

B. Satcom

C. Cellular communication

D. ANT

Browse 102 Q&As
Questions 17

Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).

Which of the following techniques was employed by Andre in the above scenario?

A. Tokenization

B. Masking

C. Hashing

D. Bucketing

Browse 102 Q&As
Questions 18

The SOC department in a multinational organization has collected logs of a security event as

"Windows.events.evtx". Study the Audit Failure logs in the event log file located in the Documents folder of the-Attacker Maehine-1" and determine the IP address of the attacker. (Note: The event ID of Audit failure logs is 4625.)

A. 10.10.1.12

B. 10.10.1.10

C. 10.10.1.16

D. 10.10.1.19

Browse 102 Q&As
Exam Code: 212-82
Exam Name: EC-Council Certified Cybersecurity Technician (C|CT)
Last Update: Mar 19, 2025
Questions: 102 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99