Eccouncil Certified Cybersecurity Technician (CCT) 212-82 Exam Practice Test

Page: 1 / 14
Total 161 questions
Question 1

Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.

Identify the type of attack signature analysis performed by Anderson in the above scenario.



Answer : D

Content-based signature analysis is the type of attack signature analysis performed by Anderson in the above scenario. Content-based signature analysis is a technique that analyzes packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit. Content-based signature analysis can help detect attacks that manipulate packet headers to evade detection or exploit vulnerabilities . Context-based signature analysis is a technique that analyzes packet payloads such as application data or commands to check whether they match any known attack patterns or signatures. Atomic-signature-based analysis is a technique that analyzes individual packets to check whether they match any known attack patterns or signatures. Composite-signature-based analysis is a technique that analyzes multiple packets or sessions to check whether they match any known attack patterns or signatures.


Question 2

Shawn, a forensic officer, was appointed to investigate a crime scene that had occurred at a coffee shop. As a part of investigation, Shawn collected the mobile device from the victim, which may contain potential evidence to identify the culprits.

Which of the following points must Shawn follow while preserving the digital evidence? (Choose three.)



Answer : B, C, D

Turn the device ON if it is OFF, do not leave the device as it is if it is ON, and make sure that the device is charged are some of the points that Shawn must follow while preserving the digital evidence in the above scenario. Digital evidence is any information or data stored or transmitted in digital form that can be used in a legal proceeding or investigation. Digital evidence can be found on various devices, such as computers, mobile phones, tablets, etc. Preserving digital evidence is a crucial step in forensic investigation that involves protecting and maintaining the integrity and authenticity of digital evidence from any alteration or damage. Some of the points that Shawn must follow while preserving digital evidence are:

Turn the device ON if it is OFF: If the device is OFF, Shawn must turn it ON to prevent any data loss or encryption that may occur when the device is powered off. Shawn must also document any password or PIN required to unlock or access the device.

Do not leave the device as it is if it is ON: If the device is ON, Shawn must not leave it as it is or use it for any purpose other than preserving digital evidence. Shawn must also disable any network connections or communication features on the device, such as Wi-Fi, Bluetooth, cellular data, etc., to prevent any remote access or deletion of data by unauthorized parties.

Make sure that the device is charged: Shawn must ensure that the device has enough battery power to prevent any data loss or corruption that may occur due to sudden shutdown or low battery. Shawn must also use a write blocker or a Faraday bag to isolate the device from any external interference or signals.

Never record the screen display of the device is not a point that Shawn must follow while preserving digital evidence. On contrary, Shawn should record or photograph the screen display of the device to capture any relevant information or messages that may appear on the screen. Recording or photographing the screen display of the device can also help document any changes or actions performed on the device during preservation.


Question 3

A disgruntled employee transferred highly confidential tender data of upcoming projects as an encoded text. You are assigned to decode the text file snitch.txt located in the Downloads folder of the Attacker Machined and determine the value of the greenfarm project in dollars. Hint 1: All the cryptography tools are located at "Z:\CCT-Tools\CCT Module 14 Cryptography". Hint 2: If required, you can use sniffer@123 as the password to decode the file. (Practical Question)



Answer : D

Decoding the Text File:

Use cryptographic tools located at Z:\CCT-Tools\CCT Module 14 Cryptography to decode the text file snitch.txt found in the Downloads folder. The provided password sniffer@123 will be used if required.


Using Decryption Tools:

Employ the appropriate decryption tool from the provided directory to decode the text file and extract the information about the greenfarm project.

Extracting the Project Value:

After decoding, the content of the file reveals that the value of the greenfarm project is 75000 dollars.

The decoded value of the greenfarm project is 75000 dollars.

Question 4

Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.

Identify the security control implemented by Hayes in the above scenario.



Answer : D

The use of authorized RTU and PLC commands is the security control implemented by Hayes in the above scenario. RTU (Remote Terminal Unit) and PLC (Programmable Logic Controller) are devices that control and monitor industrial processes, such as power generation, water treatment, oil and gas production, etc. RTU and PLC commands are instructions that are sent from a master station to a slave station to perform certain actions or request certain data. The use of authorized RTU and PLC commands is a security control that fortifies the IDMZ (Industrial Demilitarized Zone) against cyber-attacks by ensuring that only valid and authenticated commands are executed by the RTU and PLC devices. Point-to-point communication is a communication method that establishes a direct connection between two endpoints. MAC authentication is an authentication method that verifies the MAC (Media Access Control) address of a device before granting access to a network. Anti-DoS solution is a security solution that protects a network from DoS (Denial-of-Service) attacks by filtering or blocking malicious traffic.


Question 5

You are the chief cybersecurity officer at a multi-national corporation, which specializes in satellite-based communication systems. Recently, you transitioned to a more advanced system architecture that includes multiple ground stations globally. These stations synchronize and communicate via a central hub that manages the distribution of encrypted data across the network. Upon reviewing the quarterly network logs, you uncover a series of sophisticated intrusions. These intrusions are intermittently taking place inground stations located in three continents. Evidence suggests that these attacks are coordinated, aiming to map out the network's communication paths, likely in preparation for a much larger scale cyber-attack. Further investigation uncovers small pockets of malware within the system, specifically designed to circumvent your current security controls. Given the criticality of ensuring uninterrupted satellite communication, which countermeasure would be most effective in thwarting these intrusions, ensuring data integrity, and maintaining the operational status of your satellite communication systems?



Answer : C

Network Segmentation:

Network segmentation involves dividing the network into smaller, isolated segments, each with its own security policies and controls. This limits the spread of malware and unauthorized access.


Micro-Segmentation:

Micro-segmentation takes this further by creating even smaller segments within each ground station, ensuring that even if one segment is compromised, the others remain secure.

Real-Time Threat Monitoring:

Deploying real-time threat monitoring allows for the detection and response to threats as they occur, providing a dynamic and adaptive security posture.

Dynamic Policy Adjustments:

Implementing policies that can adjust in real-time based on detected threats ensures that the network remains resilient against ongoing and evolving attacks.

By adopting an advanced network segmentation strategy with real-time monitoring and dynamic policy adjustments, the corporation can effectively counter sophisticated intrusions and ensure the integrity and operational status of its satellite communication systems.

Question 6

As the director of cybersecurity for a prominent financial Institution, you oversee the security protocols for a vast array of digital operations. The institution recently transitioned to a new core banking platform that integrates an artificial intelligence (Al)-based fraud detection system. This system monitors real-time transactions, leveraging pattern recognition and behavioral analytics.

A week post-transition, you are alerted to abnormal behavior patterns in the Al system. On closer examination, the system is mistakenly flagging genuine transactions as fraudulent, causing a surge in false positives. This not only disrupts the customers' banking experience but also strains the manual review team. Preliminary investigations suggest subtle data poisoning attacks aiming to compromise the Al's training data, skewing its decision-making ability. To safeguard the Al-based fraud detection system and maintain the integrity of your financial data, which of the following steps should be your primary focus?



Answer : A

To address the issue of the AI-based fraud detection system flagging genuine transactions as fraudulent due to data poisoning, the primary focus should be on:

Retraining the AI Model:

Verified Data: Use only verified, clean transaction data to retrain the model. This helps to eliminate any compromised data that might be skewing the AI's decision-making process.

Model Integrity: Ensure the integrity of the training data to prevent future data poisoning attempts.

Real-Time Monitoring:

Detection Systems: Implement real-time monitoring to detect any attempts at data poisoning as they happen. This involves setting up alerts for abnormal patterns that could indicate malicious activity.

Continuous Learning: Integrate continuous learning systems that can adapt and respond to new threats in real-time, ensuring the AI system remains robust against evolving attack vectors.


NIST guidelines on AI and data integrity: NIST AI

Research on data poisoning and mitigation techniques: IEEE Xplore

Question 7

An IoT device that has been placed in a hospital for safety measures, it has sent an alert command to the server. The network traffic has been captured and stored in the Documents folder of the Attacker Machine-1. Analyze the loTdeviceTraffic.pcapng file and select the appropriate command that was sent by the IoT device over the network.



Answer : C

Temp_High is the command that was sent by the IoT device over the network in the above scenario. An IoT (Internet of Things) device is a device that can connect to the internet and communicate with other devices or systems over a network. An IoT device can send or receive commands or data for various purposes, such as monitoring, controlling, or automating processes. To analyze the IoT device traffic file and determine the command that was sent by the IoT device over the network, one has to follow these steps:

Navigate to the Documents folder of Attacker-1 machine.

Double-click on loTdeviceTraffic.pcapng file to open it with Wireshark.

Click on Analyze menu and select Display Filters option.

Enter udp.port == 5000 as filter expression and click on Apply button.

Observe the packets filtered by the expression.

Click on packet number 4 and expand User Datagram Protocol section in packet details pane.

Observe the data field under User Datagram Protocol section.

The data field under User Datagram Protocol section is 54:65:6d:70:5f:48:69:67:68 , which is hexadecimal representation of Temp_High , which is the command that was sent by the IoT device over the network.


Page:    1 / 14   
Total 161 questions