Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

ECCouncil 212-82 Exam Actual Questions

The questions for 212-82 were last updated on April 29, 2024.
  • Viewing page 1 out of 14 pages.
  • Viewing questions 1-4 out of 58 questions

Topic 1 - Exam A

Question #1 Topic 1

Thomas, an employee of an organization, is restricted to access specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.

  • A. Vishing
  • B. Eavesdropping
  • C. Phishing
  • D. Dumpster diving
Reveal Solution Hide Solution   Discussion   3

Correct Answer: B 🗳️

Question #2 Topic 1

Kayden successfully cracked the final round of interview at an organization. After few days, he received his offer letter through an official company email address. The email stated that the selected candidate should respond within a specified time. Kayden accepted the opportunity and provided e-signature on the offer letter, then replied to the same email address. The company validated the e-signature and added his details to their database. Here, Kayden could not deny company's message, and company could not deny Kayden's signature.
Which of the following information security elements was described in the above scenario?

  • A. Availability
  • B. Non-repudiation
  • C. Integrity
  • D. Confidentiality
Reveal Solution Hide Solution   Discussion   3

Correct Answer: B 🗳️

Question #3 Topic 1

Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.
Which of the following type of accounts the organization has given to Sam in the above scenario?

  • A. Service account
  • B. Guest account
  • C. User account
  • D. Administrator account
Reveal Solution Hide Solution   Discussion   3

Correct Answer: B 🗳️

Question #4 Topic 1

Myles, a security professional at an organization, provided laptops for all the employees to carry out the business processes from remote locations. While installing necessary applications required for the business, Myles has also installed antivirus software on each laptop following the company's policy to detect and protect the machines from external malicious events over the Internet.
Identify the PCI-DSS requirement followed by Myles in the above scenario.

  • A. PCI-DSS requirement no 1.3.2
  • B. PCI-DSS requirement no 1.3.5
  • C. PCI-DSS requirement no 5.1
  • D. PCI-DSS requirement no 1.3.1
Reveal Solution Hide Solution   Discussion   1

Correct Answer: C 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...