ExamGecko
Home / ECCouncil / 212-82 / List of questions
Ask Question

ECCouncil 212-82 Practice Test - Questions Answers, Page 15

List of questions

Question 141

Report Export Collapse

An international bank recently discovered a security breach in its transaction processing system. The breach involved a sophisticated malware that not only bypassed the standard antivirus software but also remained undetected by the intrusion detection systems for months. The malware was programmed to intermittently alter transaction values and transfer small amounts to a foreign account, making detection challenging due to the subtlety of its actions. After a thorough investigation, cybersecurity experts identified the nature of this malware. Which of the following best describes the type of malware used in this breach?

Become a Premium Member for full access
  Unlock Premium Member

Question 142

Report Export Collapse

A global financial services firm Is revising its cybersecurity policies to comply with a diverse range of international regulatory frameworks and laws. The firm operates across multiple continents, each with distinct legal requirements concerning data protection, privacy, and cybersecurity. As part of their compliance strategy, they are evaluating various regulatory frameworks to determine which ones are most critical to their operations. Given the firm's international scope and the nature of its services, which of the following regulatory frameworks should be prioritized for compliance?

Become a Premium Member for full access
  Unlock Premium Member

Question 143

Report Export Collapse

FinTech Corp, a financial services software provider, handles millions of transactions daily. To address recent breaches In other organizations. It Is reevaluating Its data security controls. It specifically needs a control that will not only provide real-time protection against threats but also assist in achieving compliance with global financial regulations. The company's primary goal is to safeguard sensitive transactional data without impeding system performance. Which of the following controls would be the most suitable for FinTech Corp's objectives?

Become a Premium Member for full access
  Unlock Premium Member

Question 144

Report Export Collapse

You are investigating a data leakage incident where an insider is suspected of using image steganography to send sensitive information to a competitor. You have also recovered a VeraCrypt volume file S3cr3t from the suspect. The VeraCrypt volume file is available In the Pictures folder of the Attacker Machined. Your task Is to mount the VeraCrypt volume, find an image file, and recover the secret code concealed in the file. Enter the code as the answer. Hint: If required, use sniffer@123 as the password to mount the VeraCrypt volume file. (Practical Question)

Become a Premium Member for full access
  Unlock Premium Member

Question 145

Report Export Collapse

A disgruntled employee transferred highly confidential tender data of upcoming projects as an encoded text. You are assigned to decode the text file snitch.txt located in the Downloads folder of the Attacker Machined and determine the value of the greenfarm project in dollars. Hint 1: All the cryptography tools are located at 'Z:\CCT-Tools\CCT Module 14 Cryptography'. Hint 2: If required, you can use sniffer@123 as the password to decode the file. (Practical Question)

Become a Premium Member for full access
  Unlock Premium Member

Question 146

Report Export Collapse

GlobalTech, a multinational corporation with over 10.000employees, has seen a surge in mobile device usage among its workforce. The IT department Is tasked with deploying a robust mobile security management solution that caters not only to the security of data but also provides flexibility in device choices and keeps administrative overhead low. Which of the following would be the best solution for GlobalTech?

Become a Premium Member for full access
  Unlock Premium Member

Question 147

Report Export Collapse

NovusCorp, a leading healthcare provider, had meticulously designed its BC and DR plans, ensuring every potential risk was covered. Recently, its primary data center experienced a catastrophic flood. It swiftly activated its DR plan, transferring operations to its secondary data center. But within 24 hours, the provider faced an unforeseen challenge: the secondary data center began to receive a huge, unprecedented amount of data requests, causing system overloads and disruptions. This situation was not a part of the provider's initial risk assessment. In the face of this predicament, what should NovusCorp's immediate course of action be to ensure business continuity?

Become a Premium Member for full access
  Unlock Premium Member

Question 148

Report Export Collapse

Hotel Grande offers luxury accommodations and emphasizes top-notch service for its guests. One such service is secure, high-speed Wi-FI access In every room. The hotel wishes to deploy an authentication method that would give individual guests a seamless experience without compromising security. This method should ideally provide a balance between convenience and strong security. Which of the following should Hotel Grande use?

Become a Premium Member for full access
  Unlock Premium Member

Question 149

Report Export Collapse

NexaBank, a prestigious banking institution, houses its primary data center in Houston, Texas. The data center is essential as It holds sensitive customer Information and processes millions of transactions daily. The bank, while confident about its cybersecurity measures, has concerns regarding the physical threats given Houston's susceptibility to natural disasters, especially hurricanes. The management understands that a natural disaster could disrupt services or, worse, compromise customer data. The bank Is now weighing options to enhance its physical security controls to account for such external threats.

For NexaBank's data center In Houston, which is the most critical physical security control it should consider implementing?

Become a Premium Member for full access
  Unlock Premium Member

Question 150

Report Export Collapse

CyberX, an acclaimed cybersecurity firm with a diverse clientele ranging from financial institutions to healthcare providers, has been approached by NexusCorp. NexusCorp, a global supply chain giant, seeks assistance in drafting a new security policy after a series of cyber-attacks that highlighted vulnerabilities in its existing protocols. While NexusCorp uses state-of-the-art technology, its security policies have not kept pace. It needs a policy that acknowledges its complex organizational structure, vast geographic spread, and diversity in employee tech proficiency.

Which should be CyberX's primary consideration in this scenario?

Become a Premium Member for full access
  Unlock Premium Member
Total 161 questions
Go to page: of 17
Search

Related questions