Exam Code: 212-82
Exam Questions: 166
Certified Cybersecurity Technician (C|CT)
Updated: 20 Feb, 2026
Viewing Page : 1 - 17
Practicing : 1 - 5 of 166 Questions
Question 1

Jordan, a network administrator in an organization, was instructed to identify network-related issues and improve network performance. While troubleshooting the network, he received a message indicating that the datagram could not be forwarded owing to the unavailability of IP-related services (such as FTP or web services) on the target host, which of the following network issues did Jordan find in this scenario? 

Options :
Answer: B

Question 2

Stella purchased a smartwatch online using her debit card. After making payment for the product through the payment gateway, she received a transaction text message with a deducted and available balance from her bank. Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario

Options :
Answer: C

Question 3

Shawn, a forensic officer, was appointed to investigate a crime scene that had occurred at a coffee shop. As a part of investigation, Shawn collected the mobile device from the victim, which may contain potential evidence to identify the culprits. Which of the following points must Shawn follow while preserving the digital evidence? (Choose three.)

Options :
Answer: B,C,D

Question 4

Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the

organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique

using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset,

and identification to check whether any fields are altered in transit.

Identify the type of attack signature analysis performed by Anderson in the above scenario.

Options :
Answer: D

Question 5

Ashton is working as a security specialist in SoftEight Tech. He was instructed by the management to strengthen the Internet access policy. For this purpose, he implemented a type of Internet access policy that forbids everything and imposes strict restrictions on all company computers, whether it is system or network usage. Identify the type of Internet access policy implemented by Ashton in the above scenario.  

Options :
Answer: A

Viewing Page : 1 - 17
Practicing : 1 - 5 of 166 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.