Exam Details

  • Exam Code
    :212-82
  • Exam Name
    :EC-Council Certified Cybersecurity Technician (C|CT)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :102 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-82 Questions & Answers

  • Question 61:

    Kaison. a forensic officer, was investigating a compromised system used for various online attacks. Kaison initiated the data acquisition process and extracted the data from the systems DVD-ROM. Which of the following types of data did Kaison acquire in the above scenario?

    A. Archival media

    B. Kernel statistics

    C. ARP cache

    D. Processor cache

  • Question 62:

    An attacker with malicious intent used SYN flooding technique to disrupt the network and gain advantage over the network to bypass the Firewall. You are working with a security architect to design security standards and plan for your organization. The network traffic was captured by the SOC team and was provided to you to perform a detailed analysis. Study the Synflood.pcapng file and determine the source IP address.

    Note: Synflood.pcapng file is present in the Documents folder of Attacker-1 machine.

    A. 20.20.10.180

    B. 20.20.10.19

    C. 20.20.10.60

    D. 20.20.10.59

  • Question 63:

    Dany, a member of a forensic team, was actively involved in an online crime investigation process. Dany's main responsibilities included providing legal advice on conducting the investigation and addressing legal issues involved in the forensic investigation process. Identify the role played by Dany in the above scenario.

    A. Attorney

    B. Incident analyzer

    C. Expert witness

    D. Incident responder

  • Question 64:

    Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.

    Identify the remote authentication protocol employed by Lorenzo in the above scenario.

    A. SNMPv3

    B. RADIUS

    C. POP3S

    D. IMAPS

  • Question 65:

    A disgruntled employee has set up a RAT (Remote Access Trojan) server in one of the machines in the target network to steal sensitive corporate documents. The IP address of the target machine where the RAT is installed is 20.20.10.26. Initiate a remote connection to the target machine from the "Attacker Machine-1" using the Theef client. Locate the "Sensitive Corporate Documents" folder in the target machine's Documents directory and determine the number of files. Mint: Theef folder is located at Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Theef of the Attacker Machine1.

    A. 2

    B. 4

    C. 5

    D. 3

  • Question 66:

    Brielle. a security professional, was instructed to secure her organization's network from malicious activities. To achieve this, she started monitoring network activities on a control system that collected event data from various sources. During this process. Brielle observed that a malicious actor had logged in to access a network device connected to the organizational network. Which of the following types of events did Brielle identify in the above scenario?

    A. Failure audit

    B. Error

    C. Success audit

    D. Warning

  • Question 67:

    Camden, a network specialist in an organization, monitored the behavior of the organizational network using SIFM from a control room. The SIEM detected suspicious activity and sent an alert to the camera. Based on the severity of the incident displayed on the screen, Camden made the correct decision and immediately launched defensive actions to prevent further exploitation by attackers.

    Which of the following SIEM functions allowed Camden to view suspicious behavior and make correct decisions during a security incident?

    A. Application log monitoring

    B. Log Retention

    C. Dashboard

    D. Data aggregation

  • Question 68:

    Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.

    Identify the type of ICMP error message received by Jaden in the above scenario.

    A. Type =12

    B. Type = 8

    C. Type = 5

    D. Type = 3

  • Question 69:

    Giovanni, a system administrator, was tasked with configuring permissions for employees working on a new project. Hit organization used active directories (ADs) to grant/deny permissions to resources Giovanni created a folder for AD users with the required permissions and added all employees working on the new project in it. Identify the type of account created by Giovanni in this scenario.

    A. Third-party account

    B. Croup-based account

    C. Shared account

    D. Application account

  • Question 70:

    You have been assigned to perform a vulnerability assessment of a web server located at IP address 20.20.10.26. Identify the vulnerability with a severity score of andA. You can use the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password for this challenge.

    A. TCP limestamps

    B. FTP Unencrypted Cleartext Login

    C. Anonymous FTP Login Reporting

    D. UDP limestamps

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-82 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.