Eccouncil 212-82 Certified Cybersecurity Technician (CCT) Exam Practice Test

Page: 1 / 14
Total 161 questions
Question 1

Richards, a security specialist at an organization, was monitoring an IDS system. While monitoring, he suddenly received an alert of an ongoing intrusion attempt on the organization's network. He immediately averted the malicious actions by implementing the necessary measures.

Identify the type of alert generated by the IDS system in the above scenario.



Question 2

The IH&R team in an organization was handling a recent malware attack on one of the hosts connected to the organization's network. Edwin, a member of the IH&R team, was involved in reinstating lost data from the backup medi

a. Before performing this step, Edwin ensured that the backup does not have any traces of malware.

Identify the IH&R step performed by Edwin in the above scenario.



Answer : D

Recovery is the IH&R step performed by Edwin in the above scenario. IH&R (Incident Handling and Response) is a process that involves identifying, analyzing, containing, eradicating, recovering from, and reporting on security incidents that affect an organization's network or system. Recovery is the IH&R step that involves restoring the normal operation of the system or network after eradicating the incident. Recovery can include reinstating lost data from the backup media, applying patches or updates, reconfiguring settings, testing functionality, etc. Recovery also involves ensuring that the backup does not have any traces of malware or compromise . Eradication is the IH&R step that involves removing all traces of the incident from the system or network, such as malware, backdoors, compromised files, etc. Incident containment is the IH&R step that involves implementing appropriate measures to stop the infection from spreading to other organizational assets and to prevent further damage to the organization. Notification is the IH&R step that involves informing relevant stakeholders, authorities, or customers about the incident and its impact.


Question 3

You are Harris working for a web development company. You have been assigned to perform a task for vulnerability assessment on the given IP address 20.20.10.26. Select the vulnerability that may affect the website according to the severity factor.

Hint: Greenbone web credentials: admin/password



Answer : C

FTP Unencrypted Cleartext Login is the vulnerability that may affect the website according to the severity factor in the above scenario. A vulnerability is a weakness or flaw in a system or network that can be exploited by an attacker to compromise its security or functionality. A vulnerability assessment is a process that involves identifying, analyzing, and evaluating vulnerabilities in a system or network using various tools and techniques. Greenbone is a tool that can perform vulnerability assessment on various targets using various tests and scans. To perform a vulnerability assessment on the given IP address 20.20.10.26, one has to follow these steps:

Open a web browser and type 20.20.10.26:9392

Press Enter key to access the Greenbone web interface.

Enter admin as username and password as password.

Click on Login button.

Click on Scans menu and select Tasks option.

Click on Start Scan icon next to IP Address Scan task.

Wait for the scan to complete and click on Report icon next to IP Address Scan task.

Observe the vulnerabilities found by the scan.

The vulnerabilities found by the scan are:

The vulnerability that may affect the website according to the severity factor is FTP Unencrypted Cleartext Login, which has a medium severity level. FTP Unencrypted Cleartext Login is a vulnerability that allows an attacker to intercept or sniff FTP login credentials that are sent in cleartext over an unencrypted connection. An attacker can use these credentials to access or modify files or data on the FTP server. TCP timestamps and UDP timestamps are vulnerabilities that allow an attacker to estimate the uptime of a system or network by analyzing the timestamp values in TCP or UDP packets. Anonymous FTP Login Reporting is a vulnerability that allows an attacker to access an FTP server anonymously without providing any username or password.


Question 4

An organization hired a network operations center (NOC) team to protect its IT infrastructure from external attacks. The organization utilized a type of threat intelligence to protect its resources from evolving threats. The threat intelligence helped the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors.

Identify the type of threat intelligence consumed by the organization in the above scenario.



Answer : C

Technical threat intelligence is a type of threat intelligence that provides information about the technical details of specific attacks, such as indicators of compromise (IOCs), malware signatures, attack vectors, and vulnerabilities. Technical threat intelligence helps the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors. Technical threat intelligence is often consumed by security analysts, incident responders, and penetration testers who need to analyze and respond to active or potential threats.


Question 5

Kasen, a cybersecurity specialist at an organization, was working with the business continuity and disaster recovery team. The team initiated various business continuity and discovery activities in the organization. In this process, Kasen established a program to restore both the disaster site and the damaged materials to the pre-disaster levels during an incident.

Which of the following business continuity and disaster recovery activities did Kasen perform in the above scenario?



Answer : D

Recovery is the business continuity and disaster recovery activity that Kasen performed in the above scenario. Business continuity and disaster recovery (BCDR) is a process that involves planning, preparing, and implementing various activities to ensure the continuity of critical business functions and the recovery of essential resources in the event of a disaster or disruption. BCDR activities can be categorized into four phases: prevention, response, resumption, and recovery . Prevention is the BCDR phase that involves identifying and mitigating potential risks and threats that can cause a disaster or disruption. Response is the BCDR phase that involves activating the BCDR plan and executing the immediate actions to protect people, assets, and operations during a disaster or disruption. Resumption is the BCDR phase that involves restoring the minimum level of services and functions required to resume normal business operations after a disaster or disruption. Recovery is the BCDR phase that involves restoring both the disaster site and the damaged materials to the pre-disaster levels during an incident.


Question 6

NexaCorp. an enterprise with a robust Linux infrastructure, has been facing consistent downtimes without any apparent reasons. The company's initial investigation suggests possible unauthorized system-level changes. NexaCorp's IT team realizes that It needs to monitor and analyze system logs more efficiently to pinpoint the cause. What would be the optimal approach for NexaCorp to monitor and analyze its Linux system logs to detect and prevent unauthorized changes?



Answer : C

For NexaCorp to effectively monitor and analyze system logs, implementing a Security Information and Event Management (SIEM) system is the optimal approach:

SIEM Overview: SIEM systems collect, normalize, and analyze log data from various sources in real-time.

Benefits:

Centralization: Aggregates logs from all systems into a single platform.

Correlation: Identifies patterns and correlates events from different sources to detect anomalies.

Implementation Steps:

Select a SIEM Solution: Choose a suitable SIEM tool (e.g., Splunk, ELK Stack, QRadar).

Integration: Configure the SIEM to collect logs from all relevant systems.

Alerting and Reporting: Set up alerts for suspicious activities and generate periodic reports.


SIEM Basics: Link

Implementing SIEM: Link

Question 7

NovusCorp, a leading healthcare provider, had meticulously designed its BC and DR plans, ensuring every potential risk was covered. Recently, its primary data center experienced a catastrophic flood. It swiftly activated its DR plan, transferring operations to its secondary data center. But within 24 hours, the provider faced an unforeseen challenge: the secondary data center began to receive a huge, unprecedented amount of data requests, causing system overloads and disruptions. This situation was not a part of the provider's initial risk assessment. In the face of this predicament, what should NovusCorp's immediate course of action be to ensure business continuity?



Answer : C

Engaging a cloud-based data storage provider allows NovusCorp to manage the sudden influx of data requests without overloading the secondary data center. Cloud providers can quickly scale resources to meet demand.


Business Continuity:

Cloud services provide a flexible and reliable solution to maintain business continuity. They offer robust disaster recovery options and can be integrated with existing DR plans.

Temporary Overflow Solution:

Using cloud storage as a temporary solution ensures that critical operations continue without interruption while the primary data center is restored.

Cost and Time Efficiency:

Cloud-based solutions can be implemented quickly and cost-effectively compared to upgrading the secondary data center's infrastructure or other complex solutions.

Given the unexpected load on the secondary data center, engaging a cloud-based data storage provider is the most effective immediate action to ensure business continuity.

Page:    1 / 14   
Total 161 questions