ECCouncil 212-82 Practice Test - Questions Answers, Page 12

List of questions
Question 111

Analyze the executable file ShadowByte.exe located in the Downloads folder of the Attacker Machine-I and determine the Linker Info value of the file. (Practical Question)
Question 112

Perform vulnerability assessment of an Android device located at IP address 172.30.20.110. Identify the severity score for the device. You can use the OpenVAS vulnerability scanner, available with Parrot Security, with credentials admln/password for this challenge. (Practical Question)
Question 113

ProNet, a leading technology firm, has been dynamically evolving its internal infrastructure to cater to an expanding workforce and changing business needs. The company's current project involves enhancing the overall security of its internal platforms. The company's security team is focusing on a robust access control system. To make the system efficient, it needs to implement a model that would define access based on roles within the organization, where specific roles would have predefined access to certain resources, and the roles can be assigned to multiple users. The aim is to decrease the administrative work involved in assigning permissions and ensure that users gain only the necessary permissions in line with their job functions.
Which access control model best suits ProNet's requirement?
Question 114

In a multinational corporation, the IT department Implemented a new network security protocol for their global data centers. This protocol was designed to enhance security measures by incorporating advanced access control principles. The protocol employs a combination of methods to ensure that only authorized personnel can access sensitive data. Recently, an incident occurred where an unauthorized user gained access to confidential data. The security team discovered that the intruder exploited a specific aspect of the access control system. Which aspect of the access control principles, terminologies, and models was most likely exploited?
Question 115

NexaCorp. an enterprise with a robust Linux infrastructure, has been facing consistent downtimes without any apparent reasons. The company's initial investigation suggests possible unauthorized system-level changes. NexaCorp's IT team realizes that It needs to monitor and analyze system logs more efficiently to pinpoint the cause. What would be the optimal approach for NexaCorp to monitor and analyze its Linux system logs to detect and prevent unauthorized changes?
Question 116

An employee was fired from his security analyst job due to misconduct. While leaving, he installed a Trojan server on his workstation at 172.30.20.75. As an ethical hacker, you are asked to identify and connect to the Trojan server and explore available files. Enter the name of the VBScript file located in the Pictures folder of the workstation. Hint: You can use one of the Ttojan client applications available at 'Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Ttojans (RAT)' of Attacker Machine-1. (Practical Question)
Question 117

You work in a Multinational Company named Vector Inc. on Hypervisors and Virtualization Software. You are using the Operating System (OS) Virtualization and you have to handle the Security risks associated with the OS virtualization. How can you mitigate these security risks?
Question 118

SecuraCorp, a leading financial institution, is worried about zero-day vulnerabilities. With a sprawling network infrastructure and multiple transaction points, it needs a system that does not solely rely on signatures but can effectively identify suspicious patterns based on the behavior in the network. Which type of IDS/IPS should SecuraCorp primarily deploy for its needs?
Question 119

You are the lead cybersecurity analyst for a multinational corporation that handles sensitive financial data. As part of your network security strategy, you have implemented both an Intrusion Detection System (IDS) and an Intrusion Prevention System(IPS) to safeguard against cyber threats. One day, your IDS alerts you to suspicious activity on the network, indicating a potential intrusion attempt from an external source. Meanwhile, your IPS springs into action, swiftly blocking the malicious traffic before it can penetrate deeper into the network. Based on this scenario, what primarily distinguishes the role of the IDS from the IPS In your network security architecture?
Question 120

A renowned research institute with a high-security wireless network recently encountered an advanced cyber attack. The attack was not detected by traditional security measures and resulted in significant data exfiltration. The wireless network was equipped with WPA3 encryption, MAC address filtering, and had disabled SSID broadcasting. Intriguingly. the attack occurred without any noticeable disruption or changes in network performance. After an exhaustive forensic analysis, the cybersecurity team pinpointed the attack method. Which of the following wireless network-specific attacks was most likely used?
Question