ECCouncil Related Exams
212-82 Exam
Stella purchased a smartwatch online using her debit card. After making payment for the product through the
payment gateway, she received a transaction text message with a deducted and available balance from her
bank.
Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario.
In an organization, all the servers and database systems are guarded in a sealed room with a single-entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.
Which of the following types of physical locks is used by the organization in the above scenario?
Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.