ExamGecko
Home / ECCouncil / 212-82 / List of questions
Ask Question

ECCouncil 212-82 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wireless technology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.

Which of the following technologies has the software company implemented in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

Matias, a network security administrator at an organization, was tasked with the implementation of secure wireless network encryption for their network. For this purpose, Matias employed a security solution that uses 256-bit Galois/Counter Mode Protocol (GCMP-256) to maintain the authenticity and confidentiality of data.

Identify the type of wireless encryption used by the security solution employed by Matias in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).

Which of the following techniques was employed by Andre in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

Ryleigh, a system administrator, was instructed to perform a full back up of organizational data on a regular basis. For this purpose, she used a backup technique on a fixed date when the employees are not accessing the system i.e., when a service-level down time is allowed a full backup is taken.

Identify the backup technique utilized by Ryleigh in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.

Identify the type of ICMP error message received by Jaden in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

Dany, a member of a forensic team, was actively involved in an online crime investigation process. Dany's main responsibilities included providing legal advice on conducting the investigation and addressing legal issues involved in the forensic investigation process. Identify the role played by Dany in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

Kaison. a forensic officer, was investigating a compromised system used for various online attacks.

Kaison initiated the data acquisition process and extracted the data from the systems DVD-ROM.

Which of the following types of data did Kaison acquire in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

Jase. a security team member at an organization, was tasked with ensuring uninterrupted business operations under hazardous conditions. Thus, Jase implemented a deterrent control strategy to minimize the occurrence of threats, protect critical business areas, and mitigate the impact of threats. Which of the following business continuity and disaster recovery activities did Jase perform in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

An organization's risk management team identified the risk of natural disasters in the organization's current location. Because natural disasters cannot be prevented using security controls, the team suggested to build a new office in another location to eliminate the identified risk. Identify the risk treatment option suggested by the risk management team in this scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

The SOC department in a multinational organization has collected logs of a security event as "Windows.events.evtx". Study the Audit Failure logs in the event log file located in the Documents folder of the

-Attacker Maehine-1" and determine the IP address of the attacker. (Note: The event ID of Audit failure logs is 4625.) (Practical Question)

Become a Premium Member for full access
  Unlock Premium Member
Total 161 questions
Go to page: of 17
Search

Related questions