Exam Details

  • Exam Code
    :212-82
  • Exam Name
    :EC-Council Certified Cybersecurity Technician (C|CT)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :102 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-82 Questions & Answers

  • Question 81:

    Leilani, a network specialist at an organization, employed Wireshark for observing network traffic. Leilani navigated to the Wireshark menu icon that contains items to manipulate, display and apply filters, enable, or disable the dissection of protocols, and configure user- specified decodes.

    Identify the Wireshark menu Leilani has navigated in the above scenario.

    A. Statistics

    B. Capture

    C. Main toolbar

    D. Analyze

  • Question 82:

    Grace, an online shopping enthusiast, purchased a smart TV using her debit card. During online payment. Grace's browser redirected her from the e-commerce website to a third- party payment gateway, where she provided her debit card details and the OTP received on her registered mobile phone. After completing the transaction, Grace logged Into her online bank account and verified the current balance in her savings account, identify the state of data being processed between the e-commerce website and payment gateway in the above scenario.

    A. Data in inactive

    B. Data in transit

    C. Data in use

    D. Data at rest

  • Question 83:

    Kasen, a cybersecurity specialist at an organization, was working with the business continuity and disaster recovery team. The team initiated various business continuity and discovery activities in the organization. In this process, Kasen established a program to restore both the disaster site and the damaged materials to the pre-disaster levels during an incident.

    Which of the following business continuity and disaster recovery activities did Kasen perform in the above scenario?

    A. Prevention

    B. Resumption

    C. Response

    D. Recovery

  • Question 84:

    Kevin, a professional hacker, wants to penetrate CyberTech Inc.'s network. He employed a technique, using which he encoded packets with Unicode characters. The company's IDS cannot recognize the packet, but the target web server can decode them.

    What is the technique used by Kevin to evade the IDS system?

    A. Desynchronization

    B. Obfuscating

    C. Session splicing

    D. Urgency flag

  • Question 85:

    An organization divided its IT infrastructure into multiple departments to ensure secure connections for data access. To provide high-speed data access, the administrator implemented a PAID level that broke data into sections and stored them across multiple drives. The storage capacity of this RAID level was equal to the sum of disk capacities in the set. Which of the following RAID levels was implemented by the administrator in the above scenario?

    A. RAID Level 0

    B. RAID Level 3

    C. RAID Level 5

    D. RAID Level 1

  • Question 86:

    Ruben, a crime investigator, wants to retrieve all the deleted files and folders in the suspected media without affecting the original files. For this purpose, he uses a method that involves the creation of a cloned copy of the entire media and prevents the contamination of the original media.

    Identify the method utilized by Ruben in the above scenario.

    A. Sparse acquisition

    B. Bit-stream imaging

    C. Drive decryption

    D. Logical acquisition

  • Question 87:

    The SOC department in a multinational organization has collected logs of a security event as

    "Windows.events.evtx". Study the Audit Failure logs in the event log file located in the Documents folder of the-Attacker Maehine-1" and determine the IP address of the attacker. (Note: The event ID of Audit failure logs is 4625.)

    A. 10.10.1.12

    B. 10.10.1.10

    C. 10.10.1.16

    D. 10.10.1.19

  • Question 88:

    A threat intelligence feed data file has been acquired and stored in the Documents folder of Attacker Machine-1 (File Name: Threatfeed.txt). You are a cybersecurity technician working for an ABC organization. Your organization has assigned you a task to analyze the data and submit a report on the threat landscape. Select the IP address linked with http://securityabc.s21sec.com.

    A. 5.9.200.200

    B. 5.9.200.150

    C. 5.9.110.120

    D. 5.9.188.148

  • Question 89:

    Charlie, a security professional in an organization, noticed unauthorized access and eavesdropping on the WLAN. To thwart such attempts, Charlie employed an encryption mechanism that used the RC4 algorithm to encrypt information in the data link layer. Identify the type of wireless encryption employed by Charlie in the above scenario.

    A. TKIP

    B. WEP

    C. AES

    D. CCMP

  • Question 90:

    An organization's risk management team identified the risk of natural disasters in the organization's current location. Because natural disasters cannot be prevented using security controls, the team suggested to build a new office in another location to eliminate the identified risk. Identify the risk treatment option suggested by the risk management team in this scenario.

    A. Risk modification

    B. Risk avoidance

    C. Risk sharing

    D. Risk retention

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-82 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.