Exam Details

  • Exam Code
    :212-82
  • Exam Name
    :Certified Cybersecurity Technician(C|CT)
  • Certification
    :Cyber Technician (CCT)
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :102 Q&As
  • Last Updated
    :Dec 15, 2024

EC-COUNCIL Cyber Technician (CCT) 212-82 Questions & Answers

  • Question 1:

    Tenda, a network specialist at an organization, was examining logged data using Windows Event Viewer to identify attempted or successful unauthorized activities. The logs analyzed by Tenda include events related to Windows security; specifically, log-on/log-off activities, resource access, and also information based on Windows system's audit policies.

    Identify the type of event logs analyzed by Tenda in the above scenario.

    A. Application event log

    B. Setup event log

    C. Security event log

    D. System event log

  • Question 2:

    An IoT device that has been placed in a hospital for safety measures, it has sent an alert command to the server. The network traffic has been captured and stored in the Documents folder of the Attacker Machine-1. Analyze the loTdeviceTraffic.pcapng file and select the appropriate command that was sent by the IoT device over the network.

    A. Tempe_Low

    B. Low_Tempe

    C. Temp_High

    D. High_Tempe

  • Question 3:

    Grace, an online shopping freak, has purchased a smart TV using her debit card. During online payment, Grace's browser redirected her from ecommerce website to a third-party payment gateway, where she provided her debit card details and OTP received on her registered mobile phone. After completing the transaction, Grace navigated to her online bank account and verified the current balance in her savings account.

    Identify the state of data when it is being processed between the ecommerce website and the payment gateway in the above scenario.

    A. Data at rest

    B. Data in inactive

    C. Data in transit

    D. Data in use

  • Question 4:

    Calvin spotted blazing flames originating from a physical file storage location in his organization because of a Short circuit. In response to the incident, he used a fire suppression system that helped curb the incident in the initial stage and prevented it from spreading over a large area. Which of the following firefighting systems did Calvin use in this scenario?

    A. Fire detection system

    B. Sprinkler system

    C. Smoke detectors

    D. Fire extinguisher

  • Question 5:

    Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.

    Which of the following types of accounts the organization has given to Sam in the above scenario?

    A. Service account

    B. Guest account

    C. User account

    D. Administrator account

  • Question 6:

    Kason, a forensic officer, was appointed to investigate a case where a threat actor has bullied certain children online. Before proceeding legally with the case, Kason has documented all the supporting documents, including source of the evidence and its relevance to the case, before presenting it in front of the jury.

    Which of the following rules of evidence was discussed in the above scenario?

    A. Authentic

    B. Understandable

    C. Reliable

    D. Admissible

  • Question 7:

    Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.

    Identify the detection method employed by the IDS solution in the above scenario.

    A. Not-use detection

    B. Protocol anomaly detection

    C. Anomaly detection

    D. Signature recognition

  • Question 8:

    in a security incident, the forensic investigation has isolated a suspicious file named "security_update.exe". You are asked to analyze the file in the Documents folder of the "Attacker Machine-1" to determine whether it is malicious. Analyze the suspicious file and identify the malware signature.

    A. Stuxnet

    B. KLEZ

    C. ZEUS

    D. Conficker

  • Question 9:

    Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.

    Identify the type of attack signature analysis performed by Anderson in the above scenario.

    A. Context-based signature analysis

    B. Atomic-signature-based analysis

    C. Composite-signature-based analysis

    D. Content-based signature analysis

  • Question 10:

    Ryleigh, a system administrator, was instructed to perform a full back up of organizational data on a regular basis. For this purpose, she used a backup technique on a fixed date when the employees are not accessing the system i.e., when a

    service-level down time is allowed a full backup is taken.

    Identify the backup technique utilized by Ryleigh in the above scenario.

    A. Nearline backup

    B. Cold backup

    C. Hot backup

    D. Warm backup

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-82 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.