ECCouncil Related Exams
212-82 Exam

Stella purchased a smartwatch online using her debit card. After making payment for the product through the
payment gateway, she received a transaction text message with a deducted and available balance from her
bank.
Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario.
Martin, a network administrator at an organization, received breaching alerts for an application. He identified that a vulnerability in the application allowed attackers to enter malicious input. Martin evaluated the threat severity and extent of damage that could be caused by this vulnerability. He then escalated the issue to the security management team to determine appropriate mitigation strategies. In which of the following threat-modeling steps did Martin evaluate the severity level of the threat?
A company decided to implement the cloud infrastructure within its corporate firewall 10 secure sensitive data from external access. The company invested heavily in creating a cloud architecture within its premises to manage full control over its corporate data. Which of the following types of cloud deployment models did the company implement in this scenario?