ExamGecko
Home / ECCouncil / 212-82 / List of questions
Ask Question

ECCouncil 212-82 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Jordan, a network administrator in an organization, was instructed to identify network-related issues and improve network performance. While troubleshooting the network, he received a message indicating that the datagram could not be forwarded owing to the unavailability of IP-related services (such as FTP or web services) on the target host, which of the following network issues did Jordan find in this scenario?

Time exceeded message
Time exceeded message
Destination unreachable message
Destination unreachable message
Unreachable networks
Unreachable networks
Network cable is unplugged
Network cable is unplugged
Suggested answer: B
Explanation:

Destination unreachable message is the network issue that Jordan found in this scenario. Destination unreachable message is a type of ICMP message that indicates that the datagram could not be forwarded owing to the unavailability of IP-related services (such as FTP or web services) on the target host. Destination unreachable message can be caused by various reasons, such as incorrect routing, firewall blocking, or host configuration problems1.

Reference: Destination Unreachable Message

asked 18/09/2024
Garvey Butler
50 questions

Question 82

Report Export Collapse

Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.

Context-based signature analysis
Context-based signature analysis
Atomic-signature-based analysis
Atomic-signature-based analysis
Composite signature-based analysis
Composite signature-based analysis
Content-based signature analysis
Content-based signature analysis
Suggested answer: D
Explanation:

Content-based signature analysis is the attack signature analysis technique employed by Finley in this scenario. Content-based signature analysis is a technique that captures and analyzes a single network packet to determine whether the signature included malicious patterns. Content-based signature analysis can be used to detect known attacks, such as buffer overflows, SQL injections, or cross-site scripting2.

Reference: Content-Based Signature Analysis

asked 18/09/2024
Abigail Dodson
40 questions

Question 83

Report Export Collapse

Zayn, a network specialist at an organization, used Wireshark to perform network analysis. He selected a Wireshark menu that provided a summary ol captured packets, IO graphs, and flow graphs. Identify the Wireshark menu selected by Zayn in this scenario.

Status bar
Status bar
Analyze
Analyze
Statistics
Statistics
Packet list panel
Packet list panel
Suggested answer: C
Explanation:

Statistics is the Wireshark menu selected by Zayn in this scenario. Statistics is a Wireshark menu that provides a summary of captured packets, IO graphs, and flow graphs. Statistics can be used to analyze various aspects of network traffic, such as protocols, endpoints, conversations, or packet lengths3.

Reference: Wireshark Statistics Menu

asked 18/09/2024
Patrick Evelinton de Souza Borges
41 questions

Question 84

Report Export Collapse

Brielle. a security professional, was instructed to secure her organization's network from malicious activities. To achieve this, she started monitoring network activities on a control system that collected event data from various sources. During this process. Brielle observed that a malicious actor had logged in to access a network device connected to the organizational network. Which of the following types of events did Brielle identify in the above scenario?

Failure audit
Failure audit
Error
Error
Success audit
Success audit
Warning
Warning
Suggested answer: C
Explanation:

Success audit is the type of event that Brielle identified in the above scenario. Success audit is a type of event that records successful attempts to access a network device or resource. Success audit can be used to monitor authorized activities on a network, but it can also indicate unauthorized activities by malicious actors who have compromised credentials or bypassed security controls4.

Reference: Success Audit Event

asked 18/09/2024
mark linde
38 questions

Question 85

Report Export Collapse

Gideon, a forensic officer, was examining a victim's Linux system suspected to be involved in online criminal activities. Gideon navigated to a directory containing a log file that recorded information related to user login/logout. This information helped Gideon to determine the current login state of cyber criminals in the victim system, identify the Linux log file accessed by Gideon in this scenario.

/va r/l og /mysq Id. log
/va r/l og /mysq Id. log
/va r/l og /wt m p
/va r/l og /wt m p
/ar/log/boot.iog
/ar/log/boot.iog
/var/log/httpd/
/var/log/httpd/
Suggested answer: B
Explanation:

/var/log/wtmp is the Linux log file accessed by Gideon in this scenario. /var/log/wtmp is a log file that records information related to user login/logout, such as username, terminal, IP address, and login time. /var/log/wtmp can be used to determine the current login state of users in a Linux system. /var/log/wtmp can be viewed using commands such as last, lastb, or utmpdump1.

Reference: Linux Log Files

asked 18/09/2024
Salih Igde
44 questions

Question 86

Report Export Collapse

Identify a machine in the network with 5SH service enabled. Initiate an SSH Connection to the machine, find the file, ttag.txt. in the machine, and enter the tile's content as the answer. The credentials tor SSH login are sam/adm(admin@123. {Practical Question)

sam@bob
sam@bob
bob2@sam
bob2@sam
sam2@bob
sam2@bob
bobt@sam
bobt@sam
Suggested answer: D
Explanation:

bob1@sam is the file's content as the answer. To find the machine with SSH service enabled, one can use a network scanning tool such as Nmap to scan the network for port 22, which is the default port for SSH. For example, the command nmap -p 22 192.168.0.0/24 will scan the network range 192.168.0.0/24 for port 22 and display the results2. To initiate an SSH connection to the machine, one can use a command-line tool such as ssh or an SSH client such as PuTTY to connect to the machine using the credentials sam/admin@123. For example, the command ssh sam@192.168.0.10 will connect to the machine with IP address 192.168.0.10 using the username sam and prompt for the password admin@1233. To find the file flag.txt in the machine, one can use a file searching tool such as find or locate to search for the file name in the machine's file system. For example, the command find / -name flag.txt will search for the file flag.txt from the root directory (/) and display its location4. To enter the file's content as the answer, one can use a file viewing tool such as cat or less to display the content of the file flag.txt. For example, the command cat /home/sam/flag.txt will display the content of the file flag.txt located in /home/sam/ directory5. The screenshot below shows an example of performing these steps: ![Screenshot of performing these steps] Reference:

Nmap Tutorial, SSH Tutorial, Find Command Tutorial, Cat Command Tutorial, [Screenshot of performing these steps]

asked 18/09/2024
Neftali Baez-Feliciano
38 questions

Question 87

Report Export Collapse

The incident handling and response (IH&R) team of an organization was handling a recent cyberattack on the organization's web server. Fernando, a member of the IH&P team, was tasked with eliminating the root cause of the incident and closing all attack vectors to prevent similar incidents in future. For this purpose. Fernando applied the latest patches to the web server and installed the latest security mechanisms on it. Identify the IH&R step performed by Fernando in this scenario.

Notification
Notification
Containment
Containment
Recovery
Recovery
Eradication
Eradication
Suggested answer: D
Explanation:

Eradication is the IH&R step performed by Fernando in this scenario. Eradication is a step in IH&R that involves eliminating the root cause of the incident and closing all attack vectors to prevent similar incidents in future. Eradication can include applying patches, installing security mechanisms, removing malware, restoring backups, or reformatting systems.

Reference: [Eradication Step in IH&R]

asked 18/09/2024
corey shields
32 questions

Question 88

Report Export Collapse

Cairo, an incident responder. was handling an incident observed in an organizational network. After performing all IH&R steps, Cairo initiated post-incident activities. He determined all types of losses caused by the incident by identifying And evaluating all affected devices, networks, applications, and software. Identify the post-incident activity performed by Cairo in this scenario.

Incident impact assessment
Incident impact assessment
Close the investigation
Close the investigation
Review and revise policies
Review and revise policies
Incident disclosure
Incident disclosure
Suggested answer: A
Explanation:

Incident impact assessment is the post-incident activity performed by Cairo in this scenario. Incident impact assessment is a post-incident activity that involves determining all types of losses caused by the incident by identifying and evaluating all affected devices, networks, applications, and software.

Incident impact assessment can include measuring financial losses, reputational damages, operational disruptions, legal liabilities, or regulatory penalties1. Reference: Incident Impact Assessment

asked 18/09/2024
Marcos Davila
36 questions

Question 89

Report Export Collapse

Desmond, a forensic officer, was investigating a compromised machine involved in various online attacks. For this purpose. Desmond employed a forensic tool to extract and analyze computer-based evidence to retrieve information related to websites accessed from the victim machine. Identify the computer-created evidence retrieved by Desmond in this scenario.

Cookies
Cookies
Documents
Documents
Address books
Address books
Compressed files
Compressed files
Suggested answer: A
Explanation:

Cookies are the computer-created evidence retrieved by Desmond in this scenario. Cookies are small files that are stored on a user's computer by a web browser when the user visits a website. Cookies can contain information such as user preferences, login details, browsing history, or tracking data.

Cookies can be used to extract and analyze computer-based evidence to retrieve information related to websites accessed from the victim machine2. Reference: Cookies

asked 18/09/2024
Giulia Maggio
43 questions

Question 90

Report Export Collapse

Walker, a security team member at an organization, was instructed to check if a deployed cloud service is working as expected. He performed an independent examination of cloud service controls to verify adherence to standards through a review of objective evidence. Further, Walker evaluated the services provided by the CSP regarding security controls, privacy impact, and performance.

Identify the role played by Walker in the above scenario.

Cloud auditor
Cloud auditor
Cloud provider
Cloud provider
Cloud carrier
Cloud carrier
Cloud consumer
Cloud consumer
Suggested answer: A
Explanation:

A cloud auditor is a role played by Walker in the above scenario. A cloud auditor is a third party who examines controls of cloud computing service providers. Cloud auditor performs an audit to verify compliance with the standards and expressed his opinion through a report89. A cloud provider is an entity that provides cloud services, such as infrastructure, platform, or software, to cloud consumers10. A cloud carrier is an entity that provides connectivity and transport of cloud services between cloud providers and cloud consumers10. A cloud consumer is an entity that uses cloud services for its own purposes or on behalf of another entity

asked 18/09/2024
Deshawn Sharpe
44 questions
Total 161 questions
Go to page: of 17
Search

Related questions