合格させる212-82テスト問題集で[2023年07月16日]に更新された62問あります [Q11-Q33]

Share

合格させる212-82テスト問題集で[2023年07月16日]に更新された62問あります

ECCouncil 212-82実際の問題と100%カバー率でリアル試験問題


ECCouncil 212-82 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Network Security Assessment Techniques and Tools
  • Computer Forensics
トピック 2
  • Network Troubleshooting
  • Mobile Device Security
トピック 3
  • Identification, Authentication, and Authorization
  • Incident Response
トピック 4
  • Network Logs Monitoring and Analysis
  • Information Security Attacks
トピック 5
  • Business Continuity and Disaster Recovery
  • Network Security Fundamentals
トピック 6
  • Network Security Controls – Technical Controls
  • IoT and OT Security
トピック 7
  • Virtualization and Cloud Computing
  • Risk Management
トピック 8
  • Information Security Threats and Vulnerabilities
  • Network Traffic Monitoring


ECCouncil 212-82 認定試験を取得することの主なメリットは、競争の激しい就職市場で個人が目立つことができることです。雇用主は常に、サイバーセキュリティに強い理解を持ち、それを活用して組織の資産を保護できる候補者を探しています。この認定試験を取得することで、個人はサイバーセキュリティの役割に成功するために必要な知識とスキルを持っていることを証明できます。

 

質問 # 11
Richards, a security specialist at an organization, was monitoring an IDS system. While monitoring, he suddenly received an alert of an ongoing intrusion attempt on the organization's network. He immediately averted the malicious actions by implementing the necessary measures.
Identify the type of alert generated by the IDS system in the above scenario.

  • A. True negative
  • B. False positive
  • C. False negative
  • D. True positive

正解:D


質問 # 12
Tenda, a network specialist at an organization, was examining logged data using Windows Event Viewer to identify attempted or successful unauthorized activities. The logs analyzed by Tenda include events related to Windows security; specifically, log-on/log-off activities, resource access, and also information based on Windows system's audit policies.
Identify the type of event logs analyzed by Tenda in the above scenario.

  • A. Setup event log
  • B. System event log
  • C. Application event log
  • D. Security event log

正解:D


質問 # 13
Ashton is working as a security specialist in SoftEight Tech. He was instructed by the management to strengthen the Internet access policy. For this purpose, he implemented a type of Internet access policy that forbids everything and imposes strict restrictions on all company computers, whether it is system or network usage.
Identify the type of Internet access policy implemented by Ashton in the above scenario.

  • A. Permissive policy
  • B. Promiscuous policy
  • C. Paranoid policy
  • D. Prudent policy

正解:C


質問 # 14
Leilani, a network specialist at an organization, employed Wireshark for observing network traffic. Leilani navigated to the Wireshark menu icon that contains items to manipulate, display and apply filters, enable, or disable the dissection of protocols, and configure user-specified decodes.
Identify the Wireshark menu Leilani has navigated in the above scenario.

  • A. Analyze
  • B. Capture
  • C. Statistics
  • D. Main toolbar

正解:B


質問 # 15
Arabella, a forensic officer, documented all the evidence related to the case in a standard forensic investigation report template. She filled different sections of the report covering all the details of the crime along with the daily progress of the investigation process.
In which of the following sections of the forensic investigation report did Arabella record the "nature of the claim and information provided to the officers"?

  • A. Evaluation and analysis process
  • B. Evidence information
  • C. Investigation process
  • D. Investigation objectives

正解:B


質問 # 16
Tristan, a professional penetration tester, was recruited by an organization to test its network infrastructure. The organization wanted to understand its current security posture and its strength in defending against external threats. For this purpose, the organization did not provide any information about their IT infrastructure to Tristan. Thus, Tristan initiated zero-knowledge attacks, with no information or assistance from the organization.
Which of the following types of penetration testing has Tristan initiated in the above scenario?

  • A. Translucent-box testing
  • B. Black-box testing
  • C. Gray-box testing
  • D. White-box testing

正解:B


質問 # 17
Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.
Identify the type of attack signature analysis performed by Anderson in the above scenario.

  • A. Context-based signature analysis
  • B. Atomic-signature-based analysis
  • C. Content-based signature analysis
  • D. Composite-signature-based analysis

正解:C


質問 # 18
Kasen, a cybersecurity specialist at an organization, was working with the business continuity and disaster recovery team. The team initiated various business continuity and discovery activities in the organization. In this process, Kasen established a program to restore both the disaster site and the damaged materials to the pre-disaster levels during an incident.
Which of the following business continuity and disaster recovery activities did Kasen perform in the above scenario?

  • A. Prevention
  • B. Resumption
  • C. Response
  • D. Recovery

正解:D


質問 # 19
A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wireless technology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.
Which of the following technologies has the software company implemented in the above scenario?

  • A. Wi-Fi
  • B. Bluetooth
  • C. RFID
  • D. WiMAX

正解:C


質問 # 20
Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to preconfigured commands.
Identify the type of Honeypot deployed by Karter in the above scenario.

  • A. Low-interaction honeypot
  • B. High-interaction honeypot
  • C. Pure honeypot
  • D. Medium-interaction honeypot

正解:A


質問 # 21
A software company is developing a new software product by following the best practices for secure application development. Dawson, a software analyst, is checking the performance of the application on the client's network to determine whether end users are facing any issues in accessing the application.
Which of the following tiers of a secure application development lifecycle involves checking the performance of the application?

  • A. Development
  • B. Quality assurance (QA)
  • C. Testing
  • D. Staging

正解:C


質問 # 22
A pfSense firewall has been configured to block a web application www.abchacker.com. Perform an analysis on the rules set by the admin and select the protocol which has been used to apply the rule.
Hint: Firewall login credentials are given below:
Username: admin
Password: admin@l23

  • A. ARP
  • B. POP3
  • C. FTP
  • D. TCP/UDP

正解:D


質問 # 23
Ruben, a crime investigator, wants to retrieve all the deleted files and folders in the suspected media without affecting the original files. For this purpose, he uses a method that involves the creation of a cloned copy of the entire media and prevents the contamination of the original medi a.
Identify the method utilized by Ruben in the above scenario.

  • A. Drive decryption
  • B. Bit-stream imaging
  • C. Sparse acquisition
  • D. Logical acquisition

正解:B


質問 # 24
Leo has walked to the nearest supermarket to purchase grocery. At the billing section, the billing executive scanned each product's machine-readable tag against a readable machine that automatically reads the product details, displays the prices of the individual product on the computer, and calculates the sum of those scanned items. Upon completion of scanning all the products, Leo has to pay the bill.
Identify the type of short-range wireless communication technology that the billing executive has used in the above scenario.

  • A. Radio-frequency identification (RFID)
  • B. QUIC
  • C. QR codes and barcodes
  • D. Near-field communication (NFC)

正解:A


質問 # 25
Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.
Identify the type of ICMP error message received by Jaden in the above scenario.

  • A. Type = 8
  • B. Type = 3
  • C. Type =12
  • D. Type = 5

正解:D


質問 # 26
Warren, a member of IH&R team at an organization, was tasked with handling a malware attack launched on one of servers connected to the organization's network. He immediately implemented appropriate measures to stop the infection from spreading to other organizational assets and to prevent further damage to the organization.
Identify the IH&R step performed by Warren in the above scenario.

  • A. Incident triage
  • B. Recovery
  • C. Containment
  • D. Eradication

正解:C


質問 # 27
Myles, a security professional at an organization, provided laptops for all the employees to carry out the business processes from remote locations. While installing necessary applications required for the business, Myles has also installed antivirus software on each laptop following the company's policy to detect and protect the machines from external malicious events over the Internet.
Identify the PCI-DSS requirement followed by Myles in the above scenario.

  • A. PCI-DSS requirement no 1.3.5
  • B. PCI-DSS requirement no 1.3.2
  • C. PCI-DSS requirement no 1.3.1
  • D. PCI-DSS requirement no 5.1

正解:D


質問 # 28
A web application www.movieabc.com was found to be prone to SQL injection attack. You are given a task to exploit the web application and fetch the user credentials. Select the UID which is mapped to user john in the database table.
Note:
Username: sam
Pass: test

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解:B


質問 # 29
Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.
Identify the security control implemented by Hayes in the above scenario.

  • A. Point-to-point communication
  • B. Use of authorized RTU and PLC commands
  • C. MAC authentication
  • D. Anti-DoS solution

正解:B


質問 # 30
Paul, a computer user, has shared information with his colleague using an online application. The online application used by Paul has been incorporated with the latest encryption mechanism. This mechanism encrypts data by using a sequence of photons that have a spinning trait while traveling from one end to another, and these photons keep changing their shapes during their course through filters: vertical, horizontal, forward slash, and backslash.
Identify the encryption mechanism demonstrated in the above scenario.

  • A. Homomorphic encryption
  • B. Rivest Shamir Adleman encryption
  • C. Quantum cryptography
  • D. Elliptic curve cryptography

正解:C


質問 # 31
RAT has been setup in one of the machines connected to the network to steal the important Sensitive corporate docs located on Desktop of the server, further investigation revealed the IP address of the server 20.20.10.26. Initiate a remote connection using thief client and determine the number of files present in the folder.
Hint: Thief folder is located at: Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Thief of Attacker Machine-1.

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解:D


質問 # 32
An organization hired a network operations center (NOC) team to protect its IT infrastructure from external attacks. The organization utilized a type of threat intelligence to protect its resources from evolving threats. The threat intelligence helped the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors.
Identify the type of threat intelligence consumed by the organization in the above scenario.

  • A. Technical threat intelligence
  • B. Strategic threat intelligence
  • C. Tactical threat intelligence
  • D. Operational threat intelligence

正解:A


質問 # 33
......

ECCouncil 212-82リアルな2023年最新のブレーン問題集で模擬試験問題集:https://www.jpntest.com/shiken/212-82-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡