New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 7 Question 23 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 23
Topic #: 7
[All 212-82 Questions]

You are working as a Security Consultant for a top firm named Beta Inc.

Being a Security Consultant, you are called in to assess your company's situation after a ransomware attack that encrypts critical data on Beta Inc. servers. What is the MOST critical action you have to take immediately after identifying the attack?

Show Suggested Answer Hide Answer
Suggested Answer: A, A

TCP Timestamps is the vulnerability with a severity score of 8.0. This can be verified by performing a vulnerability assessment of the web server located at IP address 20.20.10.26 using the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password. To perform the vulnerability assessment, one can follow these steps:

Launch the Parrot Security machine and open a terminal.

Enter the command sudo openvas-start to start the OpenVAS service and wait for a few minutes until it is ready.

Open a web browser and navigate to https://127.0.0.1:9392 to access the OpenVAS web interface.

Enter the credentials admin/password to log in to OpenVAS.

Click on Scans -> Tasks from the left menu and then click on the blue icon with a star to create a new task.

Enter a name and a comment for the task, such as ''Web Server Scan''.

Select ''Full and fast'' as the scan config from the drop-down menu.

Click on the icon with a star next to Target to create a new target.

Enter a name and a comment for the target, such as ''Web Server''.

Enter 20.20.10.26 as the host in the text box and click on Save.

Select ''Web Server'' as the target from the drop-down menu and click on Save.

Click on the green icon with a play button next to the task name to start the scan and wait for it to finish.

Click on the task name to view the scan report and click on Results from the left menu to see the list of vulnerabilities found.

Sort the list by Severity in descending order and look for the vulnerability with a severity score of 8.0. The screenshot below shows an example of performing these steps: The vulnerability with a severity score of 8.0 is TCP Timestamps, which is an option in TCP packets that can be used to measure round-trip time and improve performance, but it can also reveal information about the system's uptime, clock skew, or TCP sequence numbers, which can be used by attackers to launch various attacks, such as idle scanning, OS fingerprinting, or TCP hijacking1. The vulnerability report provides more details about this vulnerability, such as its description, impact, solution, references, and CVSS score2. Reference: Screenshot of OpenVAS showing TCP Timestamps vulnerability, TCP Timestamps Vulnerability, Vulnerability Report


Contribute your Thoughts:

0/2000 characters
Rickie
3 months ago
Wait, people actually consider paying the ransom? That's wild!
upvoted 0 times
...
Shaun
3 months ago
Paying the ransom is a terrible idea!
upvoted 0 times
...
Rima
3 months ago
Definitely A! Can't let it spread further.
upvoted 0 times
...
Lawanda
4 months ago
Really? I thought restoring from backups was the priority.
upvoted 0 times
...
Gerry
4 months ago
Gotta isolate those infected devices first!
upvoted 0 times
...
Raylene
4 months ago
Paying the ransom seems risky. I remember reading that it often doesn't guarantee access to the data again. We should avoid that option if possible.
upvoted 0 times
...
Linn
4 months ago
Restoring from backups sounds like a good idea, but I worry about whether the backups are clean. I think we discussed this in our last study group.
upvoted 0 times
...
Dusti
4 months ago
I'm not entirely sure, but I feel like analyzing the attack vector could be important too. We need to understand how it happened, right?
upvoted 0 times
...
Leota
5 months ago
I think isolating the infected devices is crucial to stop the ransomware from spreading further. I remember practicing a similar scenario in class.
upvoted 0 times
...
Estrella
5 months ago
Ah, this is a classic ransomware scenario. The most important thing is to stop the bleeding, so to speak. Isolating the infected devices is definitely the top priority - we can't let this thing spread any further. Once that's done, then we can start looking at restoring from backups.
upvoted 0 times
...
Roy
5 months ago
I'm a bit confused on this one. Should we really be focusing on isolating devices first, or should we be trying to restore the systems from backups? I'm not 100% sure what the most critical action is here.
upvoted 0 times
...
Ranee
5 months ago
Easy peasy! The answer is clearly A - identify and isolate the infected devices. That's the quickest way to stop the ransomware from spreading and causing more damage. Gotta act fast on this one.
upvoted 0 times
...
Mabel
5 months ago
Okay, let's think this through. Restoring from backups is important, but I'm not sure that should be the absolute first priority. Identifying and isolating the infected devices seems like the best way to stop the ransomware in its tracks.
upvoted 0 times
...
Kimbery
5 months ago
Hmm, this seems like a tricky one. I think the key is to act quickly to contain the damage and prevent further spread of the ransomware. Isolating the infected devices seems like the most critical first step.
upvoted 0 times
...
Stephaine
5 months ago
This question seems straightforward, I think I know the correct answer about proxy firewalls.
upvoted 0 times
...
Thurman
5 months ago
I feel pretty confident that the answer here is Boundary Analysis. Validating the date field to ensure it rejects invalid dates like February 29th is a classic example of testing the boundaries of the system.
upvoted 0 times
...
Jutta
5 months ago
Hmm, this seems like a tricky one. I'll need to think it through carefully.
upvoted 0 times
...
Joana
5 months ago
Hmm, I'm a little unsure about this one. The question is asking about a specific type of medical error, but I'm not totally familiar with the different classifications. I'll have to think it through carefully.
upvoted 0 times
...
Muriel
5 months ago
This looks like a multicast-related question, so I'll focus on understanding the command and how it relates to multicast traffic handling on PE routers.
upvoted 0 times
...
Nada
9 months ago
I bet the hackers are sitting back and laughing at the 'security consultants' trying to figure this one out. Maybe they should just consult a crystal ball instead!
upvoted 0 times
...
Bettyann
9 months ago
Whoa, whoa, hold up! Paying the ransom? That's like rewarding the bad guys. I'd rather have my data held hostage than fund their illegal activities.
upvoted 0 times
Fidelia
8 months ago
A) Identify and isolate infected devices to prevent further spread.
upvoted 0 times
...
Vernell
8 months ago
C) Analyze the attack vector to identify the source of the infection.
upvoted 0 times
...
Wei
9 months ago
B) Restore critical systems from backups according to the BCP.
upvoted 0 times
...
Dulce
9 months ago
A) Identify and isolate infected devices to prevent further spread.
upvoted 0 times
...
...
Lettie
9 months ago
I'm not paying any ransom, that's just giving in to the attackers. Analyzing the attack vector is the only way to prevent this from happening again.
upvoted 0 times
...
Vilma
10 months ago
Restoring from backups is crucial, but we need to stop the bleeding first. Isolating those devices is the way to go.
upvoted 0 times
...
Bobbye
10 months ago
Isolating infected devices is definitely the top priority here. We can't let the ransomware spread any further!
upvoted 0 times
Renea
8 months ago
C) Analyze the attack vector to identify the source of the infection.
upvoted 0 times
...
Delfina
8 months ago
B) Restore critical systems from backups according to the BCP.
upvoted 0 times
...
Marshall
8 months ago
A) Identify and isolate infected devices to prevent further spread.
upvoted 0 times
...
...
Clarence
11 months ago
But shouldn't we also analyze the attack vector to prevent future attacks?
upvoted 0 times
...
Tu
11 months ago
I agree with Tran, stopping the spread should be the top priority.
upvoted 0 times
...
Tran
11 months ago
We need to identify and isolate infected devices to prevent further spread.
upvoted 0 times
...

Save Cancel