ECCouncil 212-82 - Certified Cybersecurity Technician Exam
Page: 2 / 11
Total 55 questions
Question #6 (Topic: Exam A)
Zion belongs to a category of employees who are responsible for implementing and managing the physical security equipment installed around the facility. He was instructed by the management to check the functionality of equipment related to physical security.
Identify the designation of Zion.
Identify the designation of Zion.
A. Supervisor
B. Chief information security officer
C. Guard
D. Safety officer
Answer: C
Question #7 (Topic: Exam A)
In an organization, all the servers and database systems are guarded in a sealed room with a single entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.
Which of the following types of physical locks is used by the organization in the above scenario?
Which of the following types of physical locks is used by the organization in the above scenario?
A. Digital locks
B. Combination locks
C. Mechanical locks
D. Electromagnetic locks
Answer: B
Question #8 (Topic: Exam A)
Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.
Identify the remote authentication protocol employed by Lorenzo in the above scenario.
Identify the remote authentication protocol employed by Lorenzo in the above scenario.
A. SNMPv3
B. RADIUS
C. POP3S
D. IMAPS
Answer: B
Question #9 (Topic: Exam A)
Malachi, a security professional, implemented a firewall in his organization to trace incoming and outgoing traffic. He deployed a firewall that works at the session layer of the OSI model and monitors the TCP handshake between hosts to determine whether a requested session is legitimate.
Identify the firewall technology implemented by Malachi in the above scenario.
Identify the firewall technology implemented by Malachi in the above scenario.
A. Next generation firewall (NGFW)
B. Circuit-level gateways
C. Network address translation (NAT)
D. Packet filtering
Answer: B
Question #10 (Topic: Exam A)
Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.
Identify the detection method employed by the IDS solution in the above scenario.
A. Not-use detection
B. Protocol anomaly detection
C. Anomaly detection
D. Signature recognition
Answer: C