ExamGecko
Home Home / ECCouncil / 212-82

ECCouncil 212-82 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











Jordan, a network administrator in an organization, was instructed to identify network-related issues and improve network performance. While troubleshooting the network, he received a message indicating that the datagram could not be forwarded owing to the unavailability of IP-related services (such as FTP or web services) on the target host, which of the following network issues did Jordan find in this scenario?

A.
Time exceeded message
A.
Time exceeded message
Answers
B.
Destination unreachable message
B.
Destination unreachable message
Answers
C.
Unreachable networks
C.
Unreachable networks
Answers
D.
Network cable is unplugged
D.
Network cable is unplugged
Answers
Suggested answer: B

Explanation:

Destination unreachable message is the network issue that Jordan found in this scenario. Destination unreachable message is a type of ICMP message that indicates that the datagram could not be forwarded owing to the unavailability of IP-related services (such as FTP or web services) on the target host. Destination unreachable message can be caused by various reasons, such as incorrect routing, firewall blocking, or host configuration problems1.

Reference: Destination Unreachable Message

Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.

A.
Context-based signature analysis
A.
Context-based signature analysis
Answers
B.
Atomic-signature-based analysis
B.
Atomic-signature-based analysis
Answers
C.
Composite signature-based analysis
C.
Composite signature-based analysis
Answers
D.
Content-based signature analysis
D.
Content-based signature analysis
Answers
Suggested answer: D

Explanation:

Content-based signature analysis is the attack signature analysis technique employed by Finley in this scenario. Content-based signature analysis is a technique that captures and analyzes a single network packet to determine whether the signature included malicious patterns. Content-based signature analysis can be used to detect known attacks, such as buffer overflows, SQL injections, or cross-site scripting2.

Reference: Content-Based Signature Analysis

Zayn, a network specialist at an organization, used Wireshark to perform network analysis. He selected a Wireshark menu that provided a summary ol captured packets, IO graphs, and flow graphs. Identify the Wireshark menu selected by Zayn in this scenario.

A.
Status bar
A.
Status bar
Answers
B.
Analyze
B.
Analyze
Answers
C.
Statistics
C.
Statistics
Answers
D.
Packet list panel
D.
Packet list panel
Answers
Suggested answer: C

Explanation:

Statistics is the Wireshark menu selected by Zayn in this scenario. Statistics is a Wireshark menu that provides a summary of captured packets, IO graphs, and flow graphs. Statistics can be used to analyze various aspects of network traffic, such as protocols, endpoints, conversations, or packet lengths3.

Reference: Wireshark Statistics Menu

Brielle. a security professional, was instructed to secure her organization's network from malicious activities. To achieve this, she started monitoring network activities on a control system that collected event data from various sources. During this process. Brielle observed that a malicious actor had logged in to access a network device connected to the organizational network. Which of the following types of events did Brielle identify in the above scenario?

A.
Failure audit
A.
Failure audit
Answers
B.
Error
B.
Error
Answers
C.
Success audit
C.
Success audit
Answers
D.
Warning
D.
Warning
Answers
Suggested answer: C

Explanation:

Success audit is the type of event that Brielle identified in the above scenario. Success audit is a type of event that records successful attempts to access a network device or resource. Success audit can be used to monitor authorized activities on a network, but it can also indicate unauthorized activities by malicious actors who have compromised credentials or bypassed security controls4.

Reference: Success Audit Event

Gideon, a forensic officer, was examining a victim's Linux system suspected to be involved in online criminal activities. Gideon navigated to a directory containing a log file that recorded information related to user login/logout. This information helped Gideon to determine the current login state of cyber criminals in the victim system, identify the Linux log file accessed by Gideon in this scenario.

A.
/va r/l og /mysq Id. log
A.
/va r/l og /mysq Id. log
Answers
B.
/va r/l og /wt m p
B.
/va r/l og /wt m p
Answers
C.
/ar/log/boot.iog
C.
/ar/log/boot.iog
Answers
D.
/var/log/httpd/
D.
/var/log/httpd/
Answers
Suggested answer: B

Explanation:

/var/log/wtmp is the Linux log file accessed by Gideon in this scenario. /var/log/wtmp is a log file that records information related to user login/logout, such as username, terminal, IP address, and login time. /var/log/wtmp can be used to determine the current login state of users in a Linux system. /var/log/wtmp can be viewed using commands such as last, lastb, or utmpdump1.

Reference: Linux Log Files

Identify a machine in the network with 5SH service enabled. Initiate an SSH Connection to the machine, find the file, ttag.txt. in the machine, and enter the tile's content as the answer. The credentials tor SSH login are sam/adm(admin@123. {Practical Question)

A.
sam@bob
A.
sam@bob
Answers
B.
bob2@sam
B.
bob2@sam
Answers
C.
sam2@bob
C.
sam2@bob
Answers
D.
bobt@sam
D.
bobt@sam
Answers
Suggested answer: D

Explanation:

bob1@sam is the file's content as the answer. To find the machine with SSH service enabled, one can use a network scanning tool such as Nmap to scan the network for port 22, which is the default port for SSH. For example, the command nmap -p 22 192.168.0.0/24 will scan the network range 192.168.0.0/24 for port 22 and display the results2. To initiate an SSH connection to the machine, one can use a command-line tool such as ssh or an SSH client such as PuTTY to connect to the machine using the credentials sam/admin@123. For example, the command ssh [email protected] will connect to the machine with IP address 192.168.0.10 using the username sam and prompt for the password admin@1233. To find the file flag.txt in the machine, one can use a file searching tool such as find or locate to search for the file name in the machine's file system. For example, the command find / -name flag.txt will search for the file flag.txt from the root directory (/) and display its location4. To enter the file's content as the answer, one can use a file viewing tool such as cat or less to display the content of the file flag.txt. For example, the command cat /home/sam/flag.txt will display the content of the file flag.txt located in /home/sam/ directory5. The screenshot below shows an example of performing these steps: ![Screenshot of performing these steps] Reference:

Nmap Tutorial, SSH Tutorial, Find Command Tutorial, Cat Command Tutorial, [Screenshot of performing these steps]

The incident handling and response (IH&R) team of an organization was handling a recent cyberattack on the organization's web server. Fernando, a member of the IH&P team, was tasked with eliminating the root cause of the incident and closing all attack vectors to prevent similar incidents in future. For this purpose. Fernando applied the latest patches to the web server and installed the latest security mechanisms on it. Identify the IH&R step performed by Fernando in this scenario.

A.
Notification
A.
Notification
Answers
B.
Containment
B.
Containment
Answers
C.
Recovery
C.
Recovery
Answers
D.
Eradication
D.
Eradication
Answers
Suggested answer: D

Explanation:

Eradication is the IH&R step performed by Fernando in this scenario. Eradication is a step in IH&R that involves eliminating the root cause of the incident and closing all attack vectors to prevent similar incidents in future. Eradication can include applying patches, installing security mechanisms, removing malware, restoring backups, or reformatting systems.

Reference: [Eradication Step in IH&R]

Cairo, an incident responder. was handling an incident observed in an organizational network. After performing all IH&R steps, Cairo initiated post-incident activities. He determined all types of losses caused by the incident by identifying And evaluating all affected devices, networks, applications, and software. Identify the post-incident activity performed by Cairo in this scenario.

A.
Incident impact assessment
A.
Incident impact assessment
Answers
B.
Close the investigation
B.
Close the investigation
Answers
C.
Review and revise policies
C.
Review and revise policies
Answers
D.
Incident disclosure
D.
Incident disclosure
Answers
Suggested answer: A

Explanation:

Incident impact assessment is the post-incident activity performed by Cairo in this scenario. Incident impact assessment is a post-incident activity that involves determining all types of losses caused by the incident by identifying and evaluating all affected devices, networks, applications, and software.

Incident impact assessment can include measuring financial losses, reputational damages, operational disruptions, legal liabilities, or regulatory penalties1. Reference: Incident Impact Assessment

Desmond, a forensic officer, was investigating a compromised machine involved in various online attacks. For this purpose. Desmond employed a forensic tool to extract and analyze computer-based evidence to retrieve information related to websites accessed from the victim machine. Identify the computer-created evidence retrieved by Desmond in this scenario.

A.
Cookies
A.
Cookies
Answers
B.
Documents
B.
Documents
Answers
C.
Address books
C.
Address books
Answers
D.
Compressed files
D.
Compressed files
Answers
Suggested answer: A

Explanation:

Cookies are the computer-created evidence retrieved by Desmond in this scenario. Cookies are small files that are stored on a user's computer by a web browser when the user visits a website. Cookies can contain information such as user preferences, login details, browsing history, or tracking data.

Cookies can be used to extract and analyze computer-based evidence to retrieve information related to websites accessed from the victim machine2. Reference: Cookies

Walker, a security team member at an organization, was instructed to check if a deployed cloud service is working as expected. He performed an independent examination of cloud service controls to verify adherence to standards through a review of objective evidence. Further, Walker evaluated the services provided by the CSP regarding security controls, privacy impact, and performance.

Identify the role played by Walker in the above scenario.

A.
Cloud auditor
A.
Cloud auditor
Answers
B.
Cloud provider
B.
Cloud provider
Answers
C.
Cloud carrier
C.
Cloud carrier
Answers
D.
Cloud consumer
D.
Cloud consumer
Answers
Suggested answer: A

Explanation:

A cloud auditor is a role played by Walker in the above scenario. A cloud auditor is a third party who examines controls of cloud computing service providers. Cloud auditor performs an audit to verify compliance with the standards and expressed his opinion through a report89. A cloud provider is an entity that provides cloud services, such as infrastructure, platform, or software, to cloud consumers10. A cloud carrier is an entity that provides connectivity and transport of cloud services between cloud providers and cloud consumers10. A cloud consumer is an entity that uses cloud services for its own purposes or on behalf of another entity

Total 102 questions
Go to page: of 11