Exam Details

  • Exam Code
    :212-82
  • Exam Name
    :EC-Council Certified Cybersecurity Technician (C|CT)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :102 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-82 Questions & Answers

  • Question 31:

    Nancy, a security specialist, was instructed to identify issues related to unexpected shutdown and restarts on a Linux machine. To identify the incident cause, Nancy navigated to a directory on the Linux system and accessed a log file to

    troubleshoot problems related to improper shutdowns and unplanned restarts.

    Identify the Linux log file accessed by Nancy in the above scenario.

    A. /var/log/secure

    B. /var/log/kern.log

    C. /var/log/boot.log

    D. /var/log/lighttpd/

  • Question 32:

    Arabella, a forensic officer, documented all the evidence related to the case in a standard forensic investigation report template. She filled different sections of the report covering all the details of the crime along with the daily progress of the investigation process.

    In which of the following sections of the forensic investigation report did Arabella record the "nature of the claim and information provided to the officers"?

    A. Investigation process

    B. Investigation objectives

    C. Evidence information

    D. Evaluation and analysis process

  • Question 33:

    Richard, a professional hacker, was hired by a marketer to gather sensitive data and information about the offline activities of users from location data. Richard employed a technique to determine the proximity of a user's mobile device to an exact location using CPS features. Using this technique. Richard placed a virtual barrier positioned at a static location to interact with mobile users crossing the barrier, identify the technique employed by Richard in this scenario.

    A. Containerization

    B. Over-the-air (OTA) updates

    C. Full device encryption

    D. Ceofencing

  • Question 34:

    You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

    A. Reconnaissance

    B. Command and control

    C. Weaponization

    D. Exploitation

  • Question 35:

    A web application www.movieabc.com was found to be prone to SQL injection attack. You are given a task to exploit the web application and fetch the user credentials. Select the UID which is mapped to user john in the database table.

    Note: Username: sam Pass: test

    A. 5

    B. 3

    C. 2

    D. 4

  • Question 36:

    Leo has walked to the nearest supermarket to purchase grocery. At the billing section, the billing executive scanned each product's machine-readable tag against a readable machine that automatically reads the product details, displays the prices of the individual product on the computer, and calculates the sum of those scanned items. Upon completion of scanning all the products, Leo has to pay the bill.

    Identify the type of short-range wireless communication technology that the billing executive has used in the above scenario.

    A. Radio-frequency identification (RFID)

    B. Near-field communication (NFC)

    C. QUIC

    D. QR codes and barcodes

  • Question 37:

    Martin, a network administrator at an organization, received breaching alerts for an application. He identified that a vulnerability in the application allowed attackers to enter malicious input. Martin evaluated the threat severity and extent of damage that could be caused by this vulnerability. He then escalated the issue to the security management team to determine appropriate mitigation strategies. In which of the following threat-modeling steps did Martin evaluate the severity level of the threat?

    A. Identify vulnerabilities

    B. Application overview

    C. Risk and impact analysis

    D. Decompose the application

  • Question 38:

    Kayden successfully cracked the final round of interviews at an organization. After a few days, he received his offer letter through an official company email address. The email stated that the selected candidate should respond within a specified time. Kayden accepted the opportunity and provided an e-signature on the offer letter, then replied to the same email address. The company validated the e-signature and added his details to their database. Here, Kayden could not deny the company's message, and the company could not deny Kayden's signature.

    Which of the following information security elements was described in the above scenario?

    A. Availability

    B. Non-repudiation

    C. Integrity

    D. Confidentiality

  • Question 39:

    Elliott, a security professional, was appointed to test a newly developed application deployed over an organizational network using a Bastion host. Elliott initiated the process by configuring the nonreusable bastion host. He then tested the newly developed application to identify the presence of security flaws that were not yet known; further, he executed services that were not secure. identify the type of bastion host configured by Elliott in the above scenario.

    A. External services hosts

    B. Victim machines

    C. One-box firewalls

    D. Non-routing dual-homed hosts

  • Question 40:

    Malachi, a security professional, implemented a firewall in his organization to trace incoming and outgoing traffic. He deployed a firewall that works at the session layer of the OSI model and monitors the TCP handshake between hosts to determine whether a requested session is legitimate.

    Identify the firewall technology implemented by Malachi in the above scenario.

    A. Next generation firewall (NGFW)

    B. Circuit-level gateways

    C. Network address translation (NAT)

    D. Packet filtering

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-82 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.