Exam Details

  • Exam Code
    :212-82
  • Exam Name
    :Certified Cybersecurity Technician(C|CT)
  • Certification
    :Cyber Technician (CCT)
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :102 Q&As
  • Last Updated
    :May 11, 2024

EC-COUNCIL Cyber Technician (CCT) 212-82 Questions & Answers

  • Question 1:

    Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.

    Identify the security control implemented by Hayes in the above scenario.

    A. Point-to-point communication

    B. MAC authentication

    C. Anti-DoS solution

    D. Use of authorized RTU and PLC commands

  • Question 2:

    A pfSense firewall has been configured to block a web application www.abchacker.com. Perform an analysis on the rules set by the admin and select the protocol which has been used to apply the rule.

    Hint: Firewall login credentials are given below:

    Username: admin

    Password: admin@l23

    A. POP3

    B. TCP/UDP

    C. FTP

    D. ARP

  • Question 3:

    Ruben, a crime investigator, wants to retrieve all the deleted files and folders in the suspected media without affecting the original files. For this purpose, he uses a method that involves the creation of a cloned copy of the entire media and prevents the contamination of the original media.

    Identify the method utilized by Ruben in the above scenario.

    A. Sparse acquisition

    B. Bit-stream imaging

    C. Drive decryption

    D. Logical acquisition

  • Question 4:

    Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.

    Identify the remote authentication protocol employed by Lorenzo in the above scenario.

    A. SNMPv3

    B. RADIUS

    C. POP3S

    D. IMAPS

  • Question 5:

    Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#). Which of the following techniques was employed by Andre in the above scenario?

    A. Tokenization

    B. Masking

    C. Hashing

    D. Bucketing

  • Question 6:

    Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to preconfigured commands.

    Identify the type of Honeypot deployed by Karter in the above scenario.

    A. Low-interaction honeypot

    B. Pure honeypot

    C. Medium-interaction honeypot

    D. High-interaction honeypot

  • Question 7:

    Kason, a forensic officer, was appointed to investigate a case where a threat actor has bullied certain children online. Before proceeding legally with the case, Kason has documented all the supporting documents, including source of the evidence and its relevance to the case, before presenting it in front of the jury.

    Which of the following rules of evidence was discussed in the above scenario?

    A. Authentic

    B. Understandable

    C. Reliable

    D. Admissible

  • Question 8:

    Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.

    Which of the following type of accounts the organization has given to Sam in the above scenario?

    A. Service account

    B. Guest account

    C. User account

    D. Administrator account

  • Question 9:

    Leilani, a network specialist at an organization, employed Wireshark for observing network traffic. Leilani navigated to the Wireshark menu icon that contains items to manipulate, display and apply filters, enable, or disable the dissection of protocols, and configure user- specified decodes.

    Identify the Wireshark menu Leilani has navigated in the above scenario.

    A. Statistics

    B. Capture

    C. Main toolbar

    D. Analyze

  • Question 10:

    A software company is developing a new software product by following the best practices for secure application development. Dawson, a software analyst, is checking the performance of the application on the client's network to determine whether end users are facing any issues in accessing the application.

    Which of the following tiers of a secure application development lifecycle involves checking the performance of the application?

    A. Development

    B. Testing

    C. Quality assurance (QA)

    D. Staging

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-82 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.