212-82ブレーン問題集PDF、ECCouncil 212-82試験問題豪華お試しセット [Q25-Q48]

Share

212-82ブレーン問題集PDF、ECCouncil 212-82試験問題豪華お試しセット

2023年最新された212-82サンプル問題は信頼され続ける212-82テストエンジン

質問 25
Grace, an online shopping freak, has purchased a smart TV using her debit card. During online payment, Grace's browser redirected her from ecommerce website to a third-party payment gateway, where she provided her debit card details and OTP received on her registered mobile phone. After completing the transaction, Grace navigated to her online bank account and verified the current balance in her savings account.
Identify the state of data when it is being processed between the ecommerce website and the payment gateway in the above scenario.

  • A. Data at rest
  • B. Data in transit
  • C. Data in use
  • D. Data in inactive

正解: B

 

質問 26
You are Harris working for a web development company. You have been assigned to perform a task for vulnerability assessment on the given IP address 20.20.10.26. Select the vulnerability that may affect the website according to the severity factor.
Hint: Greenbone web credentials: admin/password

  • A. UDP timestamps
  • B. TCP timestamps
  • C. FTP Unencrypted Cleartext Login
  • D. Anonymous FTP Login Reporting

正解: C

 

質問 27
A web application www.movieabc.com was found to be prone to SQL injection attack. You are given a task to exploit the web application and fetch the user credentials. Select the UID which is mapped to user john in the database table.
Note:
Username: sam
Pass: test

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解: B

 

質問 28
RAT has been setup in one of the machines connected to the network to steal the important Sensitive corporate docs located on Desktop of the server, further investigation revealed the IP address of the server 20.20.10.26. Initiate a remote connection using thief client and determine the number of files present in the folder.
Hint: Thief folder is located at: Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Thief of Attacker Machine-1.

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解: C

 

質問 29
An MNC hired Brandon, a network defender, to establish secured VPN communication between the company's remote offices. For this purpose, Brandon employed a VPN topology where all the remote offices communicate with the corporate office but communication between the remote offices is denied.
Identify the VPN topology employed by Brandon in the above scenario.

  • A. Star topology
  • B. Point-to-Point VPN topology
  • C. Hub-and-Spoke VPN topology
  • D. Full-mesh VPN topology

正解: C

 

質問 30
Richards, a security specialist at an organization, was monitoring an IDS system. While monitoring, he suddenly received an alert of an ongoing intrusion attempt on the organization's network. He immediately averted the malicious actions by implementing the necessary measures.
Identify the type of alert generated by the IDS system in the above scenario.

  • A. False positive
  • B. False negative
  • C. True negative
  • D. True positive

正解: D

 

質問 31
Tristan, a professional penetration tester, was recruited by an organization to test its network infrastructure. The organization wanted to understand its current security posture and its strength in defending against external threats. For this purpose, the organization did not provide any information about their IT infrastructure to Tristan. Thus, Tristan initiated zero-knowledge attacks, with no information or assistance from the organization.
Which of the following types of penetration testing has Tristan initiated in the above scenario?

  • A. White-box testing
  • B. Black-box testing
  • C. Translucent-box testing
  • D. Gray-box testing

正解: B

 

質問 32
A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wireless technology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.
Which of the following technologies has the software company implemented in the above scenario?

  • A. RFID
  • B. WiMAX
  • C. Bluetooth
  • D. Wi-Fi

正解: A

 

質問 33
Bob was recently hired by a medical company after it experienced a major cyber security breach. Many patients are complaining that their personal medical records are fully exposed on the Internet and someone can find them with a simple Google search. Bob's boss is very worried because of regulations that protect those dat a. Which of the following regulations is mostly violated?

  • A. PCIDSS
  • B. ISO 2002
  • C. Pll
  • D. HIPPA/PHl

正解: D

 

質問 34
An organization hired a network operations center (NOC) team to protect its IT infrastructure from external attacks. The organization utilized a type of threat intelligence to protect its resources from evolving threats. The threat intelligence helped the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors.
Identify the type of threat intelligence consumed by the organization in the above scenario.

  • A. Strategic threat intelligence
  • B. Tactical threat intelligence
  • C. Technical threat intelligence
  • D. Operational threat intelligence

正解: C

 

質問 35
An IoT device that has been placed in a hospital for safety measures, it has sent an alert command to the server. The network traffic has been captured and stored in the Documents folder of the Attacker Machine-1. Analyze the loTdeviceTraffic.pcapng file and select the appropriate command that was sent by the IoT device over the network.

  • A. Temp_High
  • B. High_Tempe
  • C. Low_Tempe
  • D. Tempe_Low

正解: A

 

質問 36
Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.
Identify the remote authentication protocol employed by Lorenzo in the above scenario.

  • A. SNMPv3
  • B. POP3S
  • C. RADIUS
  • D. IMAPS

正解: C

 

質問 37
Ryleigh, a system administrator, was instructed to perform a full back up of organizational data on a regular basis. For this purpose, she used a backup technique on a fixed date when the employees are not accessing the system i.e., when a service-level down time is allowed a full backup is taken.
Identify the backup technique utilized by Ryleigh in the above scenario.

  • A. Hot backup
  • B. Warm backup
  • C. Cold backup
  • D. Nearline backup

正解: C

 

質問 38
Paul, a computer user, has shared information with his colleague using an online application. The online application used by Paul has been incorporated with the latest encryption mechanism. This mechanism encrypts data by using a sequence of photons that have a spinning trait while traveling from one end to another, and these photons keep changing their shapes during their course through filters: vertical, horizontal, forward slash, and backslash.
Identify the encryption mechanism demonstrated in the above scenario.

  • A. Homomorphic encryption
  • B. Rivest Shamir Adleman encryption
  • C. Elliptic curve cryptography
  • D. Quantum cryptography

正解: D

 

質問 39
Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.

  • A. Anomaly detection
  • B. Signature recognition
  • C. Not-use detection
  • D. Protocol anomaly detection

正解: A

 

質問 40
Nancy, a security specialist, was instructed to identify issues related to unexpected shutdown and restarts on a Linux machine. To identify the incident cause, Nancy navigated to a directory on the Linux system and accessed a log file to troubleshoot problems related to improper shutdowns and unplanned restarts.
Identify the Linux log file accessed by Nancy in the above scenario.

  • A. /var/log/boot.log
  • B. /var/log/kern.log
  • C. /var/log/lighttpd/
  • D. /var/log/secure

正解: A

 

質問 41
Kevin, a professional hacker, wants to penetrate CyberTech Inc.'s network. He employed a technique, using which he encoded packets with Unicode characters. The company's IDS cannot recognize the packet, but the target web server can decode them.
What is the technique used by Kevin to evade the IDS system?

  • A. Desynchronization
  • B. Session splicing
  • C. Urgency flag
  • D. Obfuscating

正解: D

 

質問 42
Jaden, a network administrator at an organization, used the ping command to check the status of a system connected to the organization's network. He received an ICMP error message stating that the IP header field contains invalid information. Jaden examined the ICMP packet and identified that it is an IP parameter problem.
Identify the type of ICMP error message received by Jaden in the above scenario.

  • A. Type =12
  • B. Type = 3
  • C. Type = 5
  • D. Type = 8

正解: C

 

質問 43
In an organization, all the servers and database systems are guarded in a sealed room with a single entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.
Which of the following types of physical locks is used by the organization in the above scenario?

  • A. Digital locks
  • B. Mechanical locks
  • C. Electromagnetic locks
  • D. Combination locks

正解: D

 

質問 44
Warren, a member of IH&R team at an organization, was tasked with handling a malware attack launched on one of servers connected to the organization's network. He immediately implemented appropriate measures to stop the infection from spreading to other organizational assets and to prevent further damage to the organization.
Identify the IH&R step performed by Warren in the above scenario.

  • A. Containment
  • B. Recovery
  • C. Incident triage
  • D. Eradication

正解: A

 

質問 45
A text file containing sensitive information about the organization has been leaked and modified to bring down the reputation of the organization. As a safety measure, the organization did contain the MD5 hash of the original file. The file which has been leaked is retained for examining the integrity. A file named "Sensitiveinfo.txt" along with OriginalFileHash.txt has been stored in a folder named Hash in Documents of Attacker Machine-1. Compare the hash value of the original file with the leaked file and state whether the file has been modified or not by selecting yes or no.

  • A. No
  • B. Yes

正解: B

 

質問 46
Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.
Identify the type of attack signature analysis performed by Anderson in the above scenario.

  • A. Atomic-signature-based analysis
  • B. Content-based signature analysis
  • C. Composite-signature-based analysis
  • D. Context-based signature analysis

正解: B

 

質問 47
A pfSense firewall has been configured to block a web application www.abchacker.com. Perform an analysis on the rules set by the admin and select the protocol which has been used to apply the rule.
Hint: Firewall login credentials are given below:
Username: admin
Password: admin@l23

  • A. ARP
  • B. TCP/UDP
  • C. FTP
  • D. POP3

正解: B

 

質問 48
......

無料お試しECCouncil 212-82問題集PDFは必ずベストの問題集オプションを使おう:https://www.jpntest.com/shiken/212-82-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡