Exam Details

  • Exam Code
    :212-82
  • Exam Name
    :EC-Council Certified Cybersecurity Technician (C|CT)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :102 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-82 Questions & Answers

  • Question 91:

    Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.

    Identify the type of threat-hunting method employed by Mark in the above scenario.

    A. Entity-driven hunting

    B. TTP-driven hunting

    C. Data-driven hunting

    D. Hybrid hunting

  • Question 92:

    Ayden works from home on his company's laptop. During working hours, he received an antivirus software update notification on his laptop. Ayden clicked on the update button; however, the system restricted the update and displayed a message stating that the update could only be performed by authorized personnel. Which of the following PCI-DSS requirements is demonstrated In this scenario?

    A. PCI-DSS requirement no 53

    B. PCI-DSS requirement no 1.3.1

    C. PCI-DSS requirement no 5.1

    D. PCI-DSS requirement no 1.3.2

  • Question 93:

    Initiate an SSH Connection to a machine that has SSH enabled in the network. After connecting to the machine find the file flag.txt and choose the content hidden in the file. Credentials for SSH login are provided below:

    Hint:

    Username: sam

    Password: admin@l23

    A. sam@bob

    B. bob2@sam

    C. bob@sam

    D. sam2@bob

  • Question 94:

    A software team at an MNC was involved in a project aimed at developing software that could detect the oxygen levels of a person without physical contact, a helpful solution for pandemic situations. For this purpose, the team used a wireless technology that could digitally transfer data between two devices within a short range of up to 5 m and only worked in the absence of physical blockage or obstacle between the two devices, identify the technology employed by the software team in the above scenario.

    A. Infrared

    B. USB

    C. CPS

    D. Satcom

  • Question 95:

    An MNC hired Brandon, a network defender, to establish secured VPN communication between the company's remote offices. For this purpose, Brandon employed a VPN topology where all the remote offices communicate with the corporate office but communication between the remote offices is denied.

    Identify the VPN topology employed by Brandon in the above scenario.

    A. Point-to-Point VPN topology

    B. Star topology

    C. Hub-and-Spoke VPN topology

    D. Full-mesh VPN topology

  • Question 96:

    George, a security professional at an MNC, implemented an Internet access policy that allowed employees working from a remote location to access any site, download any application, and access any computer or network without any restrictions. Identify the type of Internet access policy implemented by George in this scenario.

    A. Permissive policy

    B. Paranoid policy

    C. Prudent policy

    D. Promiscuous policy

  • Question 97:

    Ashton is working as a security specialist in SoftEight Tech. He was instructed by the management to strengthen the Internet access policy. For this purpose, he implemented a type of Internet access policy that forbids everything and imposes strict restrictions on all company computers, whether it is system or network usage.

    Identify the type of Internet access policy implemented by Ashton in the above scenario.

    A. Paranoid policy

    B. Prudent policy

    C. Permissive policy

    D. Promiscuous policy

  • Question 98:

    A pfSense firewall has been configured to block a web application www.abchacker.com. Perform an analysis on the rules set by the admin and select the protocol which has been used to apply the rule.

    Hint: Firewall login credentials are given below:

    Username: admin

    Password: admin@l23

    A. POP3

    B. TCP/UDP

    C. FTP

    D. ARP

  • Question 99:

    Stella purchased a smartwatch online using her debit card. After making payment for the product through the payment gateway, she received a transaction text message with a deducted and available balance from her bank.

    Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario.

    A. Non-repudiation

    B. Integrity

    C. Availability

    D. Confidentiality

  • Question 100:

    Warren, a member of IHandR team at an organization, was tasked with handling a malware attack launched on one of servers connected to the organization's network. He immediately implemented appropriate measures to stop the infection from spreading to other organizational assets and to prevent further damage to the organization.

    Identify the IHandR step performed by Warren in the above scenario.

    A. Containment

    B. Recovery

    C. Eradication

    D. Incident triage

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-82 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.