ECCouncil 212-82 Practice Test - Questions Answers, Page 11
List of questions
Question 101

A disgruntled employee has set up a RAT (Remote Access Trojan) server in one of the machines in the target network to steal sensitive corporate documents. The IP address of the target machine where the RAT is installed is 20.20.10.26. Initiate a remote connection to the target machine from the "Attacker Machine-1" using the Theef client. Locate the "Sensitive Corporate Documents" folder in the target machine's Documents directory and determine the number of files. Mint: Theef folder is located at Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Theef of the Attacker Machine1.
Question 102

You have been assigned to perform a vulnerability assessment of a web server located at IP address 20.20.10.26. Identify the vulnerability with a severity score of & A. You can use the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password for this challenge. (Practical Question)
Question 103

MediData, a leading healthcare data analytics firm based in the US, has made significant strides in advance health diagnostics using Al. With a vast repository of patient data and seeing the potential market In Europ MediData plans to expand its services there. However, the leadership is wary. Europe's stringent data protects regulations require companies to adapt their data processing practices. The legal team at MediData is task; with ensuring compliance and minimizing potential litigation or penalties. As MediData plans its Europe; expansion, which regulatory framework should it be most concerned with?
Question 104

DigitalVault Corp., a premier financial institution, has recently seen a significant rise in advanced persistent threats (APTs)targetlng Its mainframe systems. Considering the sensitivity of the data stored, It wants to employ a strategy that deceives attackers into revealing their techniques. As part of its defense strategy, the cybersecurity team is deliberating over-deploying a honeypot system. Given the bank's requirements, the team are evaluating different types of honeypots. DigitalVault's primary goal Is to gather extensive Information about the attackers' methods without putting its actual systems at risk. Which of the following honeypots would BEST serve DigitalVault's intent?
Question 105

ApexTech, a cybersecurity consultancy, was approached by a large energy conglomerate to assess the robustness of its energy grid control systems. The conglomerate Is transitioning from traditional systems to a more interconnected smart grid. ApexTech proposed a penetration test to identify potential vulnerabilities in the new setup. The firm provided four methodologies it could employ to assess the system's vulnerabilities comprehensively. The energy conglomerate must select the approach that would be MOST revealing and beneficial in identifying vulnerabilities in the context of its transitioning infrastructure:
Question 106

PolarFin. a global finance institution, is in the process of migrating to a new transactional system. Given the sensitivity of financial data and international regulations it adheres to. PolarFin needs an encryption algorithm that provides strong security and Is also widely accepted Internationally. The algorithm should also support both encryption and decryption functions. Which cryptographic algorithm should PolarFin consider as its primary choice for this transition?
Question 107

As the senior network analyst for a leading fintech organization, you have been tasked with ensuring seamless communication between the firm's global offices. Your network has been built with redundancy in mind, leveraging multiple service providers and a mixture of MPLS and public internet connections.One week after deploying a state-of-the-art Network Performance Monitoring & Diagnostics (NPMD) tool, you notice unusual traffic patterns originating from your European data center and targeting the corporate headquarters in New York. The traffic spikes periodically, heavily utilizing the MPLS link and sometimes saturating the public internet connection, resulting in significant data packet losses and application failures. Your task is to identify the root cause of these traffic anomalies and ensure optimal network performance for all critical business operations. Given this scenario, what could be the primary cause for these traffic spikes, and what should your Immediate course of action be?
Question 108

You recently purchased a smart thermostat for your home. It allows you to control the temperature remotely through a mobile app. Considering the security of your new smart thermostat, which of the following actions would be the LEAST effective In protecting It from unauthorized access?
Question 109

A John-the-Ripper hash dump of an FTP server's login credentials is stored as 'target-file' on the Desktop of Attacker Machine-2. Crack the password hashes in the file to recover the login credentials of the FTP server. The FTP root directory hosts an exploit file. Read the exploit file and enter the name of the exploit's author as the answer. Hint: Not all the credentials will give access to the FTP. (Practical Question)
Question 110

You are working as a Security Consultant for a top firm named Beta Inc.
Being a Security Consultant, you are called in to assess your company's situation after a ransomware attack that encrypts critical data on Beta Inc. servers. What is the MOST critical action you have to take immediately after identifying the attack?
Question