Download Eccouncil Certified Cybersecurity Technician (CCT).VCEPlus.212-82.2022-11-16.1e.60q.vcex

Download Exam

File Info

Exam Eccouncil Certified Cybersecurity Technician (CCT)
Number 212-82
File Name Eccouncil Certified Cybersecurity Technician (CCT).VCEPlus.212-82.2022-11-16.1e.60q.vcex
Size 40 Kb
Posted November 16, 2022
Downloads 7

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
Thomas, an employee of an organization, is restricted to access specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.

  • A: Vishing
  • B: Eavesdropping
  • C: Phishing
  • D: Dumpster diving

Question 2
Kayden successfully cracked the final round of interview at an organization. After few days, he received his offer letter through an official company email address. The email stated that the selected candidate should respond within a specified time. Kayden accepted the opportunity and provided e-signature on the offer letter, then replied to the same email address. The company validated the e-signature and added his details to their database. Here, Kayden could not deny company's message, and company could not deny Kayden's signature.
Which of the following information security elements was described in the above scenario?

  • A: Availability
  • B: Non-repudiation
  • C: Integrity
  • D: Confidentiality

Question 3
Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.
Which of the following type of accounts the organization has given to Sam in the above scenario?

  • A: Service account
  • B: Guest account
  • C: User account
  • D: Administrator account

Question 4
Myles, a security professional at an organization, provided laptops for all the employees to carry out the business processes from remote locations. While installing necessary applications required for the business, Myles has also installed antivirus software on each laptop following the company's policy to detect and protect the machines from external malicious events over the Internet.
Identify the PCI-DSS requirement followed by Myles in the above scenario.

  • A: PCI-DSS requirement no 1.3.2
  • B: PCI-DSS requirement no 1.3.5
  • C: PCI-DSS requirement no 5.1
  • D: PCI-DSS requirement no 1.3.1

Question 5
Ashton is working as a security specialist in SoftEight Tech. He was instructed by the management to strengthen the Internet access policy. For this purpose, he implemented a type of Internet access policy that forbids everything and imposes strict restrictions on all company computers, whether it is system or network usage.
Identify the type of Internet access policy implemented by Ashton in the above scenario.

  • A: Paranoid policy
  • B: Prudent policy
  • C: Permissive policy
  • D: Promiscuous policy

Question 6
Zion belongs to a category of employees who are responsible for implementing and managing the physical security equipment installed around the facility. He was instructed by the management to check the functionality of equipment related to physical security. Identify the designation of Zion.

  • A: Supervisor
  • B: Chief information security officer
  • C: Guard
  • D: Safety officer

Question 7
In an organization, all the servers and database systems are guarded in a sealed room with a single entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.
Which of the following types of physical locks is used by the organization in the above scenario?

  • A: Digital locks
  • B: Combination locks
  • C: Mechanical locks
  • D: Electromagnetic locks

Question 8
Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.
Identify the remote authentication protocol employed by Lorenzo in the above scenario.

  • A: SNMPv3
  • C: POP3S
  • D: IMAPS

Question 9
Malachi, a security professional, implemented a firewall in his organization to trace incoming and outgoing traffic. He deployed a firewall that works at the session layer of the OSI model and monitors the TCP handshake between hosts to determine whether a requested session is legitimate.
Identify the firewall technology implemented by Malachi in the above scenario.

  • A: Next generation firewall (NGFW)
  • B: Circuit-level gateways
  • C: Network address translation (NAT)
  • D: Packet filtering

Question 10
Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.

  • A: Not-use detection
  • B: Protocol anomaly detection
  • C: Anomaly detection
  • D: Signature recognition



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files