Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 212-82 Practice Exam with Questions & Answers | Set: 5

Questions 41

Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).

Which of the following techniques was employed by Andre in the above scenario?

Options:
A.

Tokenization

B.

Masking

C.

Hashing

D.

Bucketing

ECCouncil 212-82 Premium Access
Questions 42

Steve, a network engineer, was tasked with troubleshooting a network issue that is causing unexpected packet drops. For this purpose, he employed a network troubleshooting utility to capture the ICMP echo request packets sent to the server. He identified that certain packets are dropped at the gateway due to poor network connection.

Identify the network troubleshooting utility employed by Steve in the above scenario.

Options:
A.

dnsenurn

B.

arp

C.

traceroute

D.

ipconfig

Questions 43

A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wirelesstechnology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.

Which of the following technologies has the software company implemented in the above scenario?

Options:
A.

WiMAX

B.

RFID

C.

Bluetooth

D.

Wi-Fi

Questions 44

In an advancedcybersecurity research lab. a team Is working on developing a new cryptographicprotocol to secure highly sensitive communication. Their goal is to create aprotocol that is resilient against quantum computing attacks, which couldpotentially break many current encryption methods. During their research, theyfocus on the use of hash functions in their protocol. The team experiments withvarious hash functions to ensure the highest level of security. Considering thethreat of quantum computing, which of the following hash functions would be themost appropriate choice fortheir protocol?

Options:
A.

SHA-256, due to its widespread use and proven security track record

B.

MD5, for its speed and efficiency in generating hash values

C.

HMAC. for its ability to provide data integrity and authentication

D.

SHA-3. as it is designed to be resistant against quantum computing attacks

Questions 45

Stella purchased a smartwatch online using her debit card. After making payment for the product through the

payment gateway, she received a transaction text message with a deducted and available balance from her

bank.

Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario.

Options:
A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Questions 46

RevoMedia, a digital marketing agency, often conducts client presentations off-site. The agency’s team uses mobile devices to connect to various networks and display content. Withthe rising threat landscape, it wants to adopt the most secure method for connecting its mobile devices to unfamiliar networks. Which of the following should RevoMedia adopt?

Options:
A.

Bluetooth pairing

B.

Virtual Private Network (VPN) connections

C.

USB tethering

D.

Direct Wi-Fi connectivity

Questions 47

NexaBank, a prestigious banking institution, houses its primary data center in Houston, Texas. The data center is essential as It holds sensitive customer Information and processes millions of transactions daily. The bank, while confident about its cybersecurity measures, has concerns regarding the physical threats given Houston's susceptibility to natural disasters, especially hurricanes. The management understands that a natural disaster could disrupt services or, worse, compromise customer data. The bank Is now weighing options to enhance its physical security controls to account for such external threats.

For NexaBank's data center In Houston, which is the most critical physical security control it should consider implementing?

Options:
A.

Bulletproof glass windows and fortified walls.

B.

Flood-resistant barriers and drainage systems.

C.

Deploy additional armed security personnel.

D.

Advanced CCTV surveillance with facial recognition.

Questions 48

Perform vulnerability analysis of a web application, www.luxurytreats.com. and determine the name of the alert with WASC ID 9. (Practical Question)

Options:
A.

Absence of Anti-CSRF Tokens

B.

Application Error Disclosure

C.

Viewstate without MAC Signature

D.

X-Frame-Options Header Not Set