ExamGecko
Home / ECCouncil / 212-82 / List of questions
Ask Question

ECCouncil 212-82 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

Analyze the executable file ShadowByte.exe located in the Downloads folder of the Attacker Machine-I and determine the Linker Info value of the file. (Practical Question)

Become a Premium Member for full access
  Unlock Premium Member

Question 112

Report Export Collapse

Perform vulnerability assessment of an Android device located at IP address 172.30.20.110. Identify the severity score for the device. You can use the OpenVAS vulnerability scanner, available with Parrot Security, with credentials admln/password for this challenge. (Practical Question)

Become a Premium Member for full access
  Unlock Premium Member

Question 113

Report Export Collapse

ProNet, a leading technology firm, has been dynamically evolving its internal infrastructure to cater to an expanding workforce and changing business needs. The company's current project involves enhancing the overall security of its internal platforms. The company's security team is focusing on a robust access control system. To make the system efficient, it needs to implement a model that would define access based on roles within the organization, where specific roles would have predefined access to certain resources, and the roles can be assigned to multiple users. The aim is to decrease the administrative work involved in assigning permissions and ensure that users gain only the necessary permissions in line with their job functions.

Which access control model best suits ProNet's requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 114

Report Export Collapse

In a multinational corporation, the IT department Implemented a new network security protocol for their global data centers. This protocol was designed to enhance security measures by incorporating advanced access control principles. The protocol employs a combination of methods to ensure that only authorized personnel can access sensitive data. Recently, an incident occurred where an unauthorized user gained access to confidential data. The security team discovered that the intruder exploited a specific aspect of the access control system. Which aspect of the access control principles, terminologies, and models was most likely exploited?

Become a Premium Member for full access
  Unlock Premium Member

Question 115

Report Export Collapse

NexaCorp. an enterprise with a robust Linux infrastructure, has been facing consistent downtimes without any apparent reasons. The company's initial investigation suggests possible unauthorized system-level changes. NexaCorp's IT team realizes that It needs to monitor and analyze system logs more efficiently to pinpoint the cause. What would be the optimal approach for NexaCorp to monitor and analyze its Linux system logs to detect and prevent unauthorized changes?

Become a Premium Member for full access
  Unlock Premium Member

Question 116

Report Export Collapse

An employee was fired from his security analyst job due to misconduct. While leaving, he installed a Trojan server on his workstation at 172.30.20.75. As an ethical hacker, you are asked to identify and connect to the Trojan server and explore available files. Enter the name of the VBScript file located in the Pictures folder of the workstation. Hint: You can use one of the Ttojan client applications available at 'Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Ttojans (RAT)' of Attacker Machine-1. (Practical Question)

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

You work in a Multinational Company named Vector Inc. on Hypervisors and Virtualization Software. You are using the Operating System (OS) Virtualization and you have to handle the Security risks associated with the OS virtualization. How can you mitigate these security risks?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

SecuraCorp, a leading financial institution, is worried about zero-day vulnerabilities. With a sprawling network infrastructure and multiple transaction points, it needs a system that does not solely rely on signatures but can effectively identify suspicious patterns based on the behavior in the network. Which type of IDS/IPS should SecuraCorp primarily deploy for its needs?

Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

You are the lead cybersecurity analyst for a multinational corporation that handles sensitive financial data. As part of your network security strategy, you have implemented both an Intrusion Detection System (IDS) and an Intrusion Prevention System(IPS) to safeguard against cyber threats. One day, your IDS alerts you to suspicious activity on the network, indicating a potential intrusion attempt from an external source. Meanwhile, your IPS springs into action, swiftly blocking the malicious traffic before it can penetrate deeper into the network. Based on this scenario, what primarily distinguishes the role of the IDS from the IPS In your network security architecture?

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

A renowned research institute with a high-security wireless network recently encountered an advanced cyber attack. The attack was not detected by traditional security measures and resulted in significant data exfiltration. The wireless network was equipped with WPA3 encryption, MAC address filtering, and had disabled SSID broadcasting. Intriguingly. the attack occurred without any noticeable disruption or changes in network performance. After an exhaustive forensic analysis, the cybersecurity team pinpointed the attack method. Which of the following wireless network-specific attacks was most likely used?

Become a Premium Member for full access
  Unlock Premium Member
Total 161 questions
Go to page: of 17
Search

Related questions