Rewritten RCCE Level 2 Exam Guide Questions For June 2024
Rewritten RCCE Level 2 Exam Guide Questions For June 2024
Question 1: Which two techniques are characteristic of spear phishing? (Choose two.)
Question 2: What are two ways to prevent phishing attacks within an organisation?
(Choose two.)
Question 3: How can you secure IT infrastructure with ML-enabled cyber tools through
deep analytics?
(b) Upgrading security technologies to those built with Zero Trust principles and/or ML
augmentation.
(d) Identifying all attacks inside and outside the office network.
Question 4: What factors can help Phishing attackers exploit a security breach?
(a) Unencrypted client data on a USB stick is lost outside the office.
(c) Systems have strong default configurations geared towards better security.
Question 6: Identify two methods attackers use to take advantage of privilege escalation.
(Select two.)
(b) Lemon.
(c) remotedrop.
Question 9: What factors can affect the effective use of cyber weapons?
Question 11: Identify two practical uses of Quantum Entanglement. (Choose two.)
(b) Using an ultra-precise clock to manage things like the stock market.
(c) Using the BB84 protocol, also known as the Polarized Photons protocol.
Question 13: Identify two security tools commonly used in bug bounty hunting. (Choose
two.)
(a) IronWASP.
(c) .onion.
(d) linkscrapper.
(c) FERPA.
(d) GDPR.
(c) Entanglement.
(b) A subsection of the deep web that stores and manages important data and information.
Question 19: What is one solution that stealth tools provide against cybercrime?
(a) H2O.AI.
(b) Node.js.
(d) WPA2.
Question 22: Identify two service capabilities of Azure Machine Learning. (Choose two.)
(a) SymantecAV.
(b) A process that searches for data from all web content.
(c) A process for optimizing network security by identifying and preventing threats.
(c) A threat modelling process that is a risk-centric, seven-step security management process for
a business.
(d) A set of diagrams that depict attacks on a system in the form of trees.
(a) An AI-based application used to detect vulnerabilities and defend physical and digital
systems.
(c) A dark web site not directly accessible through normal search engines.
(d) A system through which credentials are held, issued, verified, and presented.
Question 29: Identify two capabilities leveraged in the identification of threats using
advanced analytics. (Choose two.)
(b) A method for identifying the local importance of a word by its occurrence in a document.
(c) A model where the final dense layer predicts the output probabilities of the stances.
(d) Regular scanning for vulnerability checks using anti-virus software.
(a) DNS level identification can determine if your environment has a crypto-mining problem.
(b) Performing regular security risk assessments helps to resolve denial of service-related
vulnerabilities.
(c) A contextual analysis determines the acting force and frequency of the threat actor.
(a) Self-training is used to increase the amount of labelled data for training.
(b) Labelled data are used to train the machine learning models.
(c) A previously learned supervised approach is used to further label the unlabelled commit data.
Question 33: Choose any two options which characterise program code features in a K-fold
stacking model. (Choose two.)
(a) A theory for simulating crimes and ensuring that strategies are in place to prevent them.
(b) Using IoT to keep tabs on the specific categories of crime that go unprevented and
unchecked.
(d) A theory for organising the dimensions and indices used in the analysis of security
vulnerabilities and risks of victimization from cybercrime in public access internet facilities.
(a) FNMR is the percentage of non-mate pairs whose matching scores are greater than or equal
to t, while FMR is the percentage of mate pairs whose matching scores are less than t.
(b) FMR is the percentage of non-mate pairs whose matching scores are greater than or equal to
t, and FNMR is the percentage of mate pairs whose matching scores are less than t.
(c) FMR is the false match ratio, while FNMR is the false non-match ratio.
(d) FMR has a given threshold, while FNMR has no given threshold.
Question 38: What is Principal Component Analysis (PCA)?
Question 39: Choose the two main technologies used for facial recognition. (Choose two.)
(c) Eigenface.
Question 40: Which of the following are levels of threat intelligence? (Choose any two.)
(a) Theoretical.
(b) Tactical.
(c) Strategic.
(d) Environmental.
Question 41: Which of the following are components of the intelligence cycle? (Choose any
two.)
(a) Reporting.
(c) Dissemination.
(d) Collection.
Question 42: What are two key players in strategic threat analysis? (Choose any two.)
(a) Vectors.
(d) Actors.
Question 43: Choose any two differences between traditional and cyber warfare. (Choose
any two.)
(a) Traditional war causes death and damage to land, but cyber war is usually restricted to
causing damage to a vast number of digital devices.
(b) Traditional war did not use weapons, while cyber war uses cyber technology.
(d) Traditional warfare would be led by civilians, and in cyber warfare the main actors would be
state and non-state actors.
Question 44: Choose any two types of artificial intelligence. (Choose any two.)
Question 46: Which of these is performed by offensive AI? (Choose any three.)
(a) Strong AI equips systems with the ability to learn from experience.
(a) Vehicle-to-everything.
(b) Vehicle-to-driver.
(c) Vehicle-to-manufacturer.
(d) Vehicle-to-owner.
Question 49: Mention any three benefits of connected cars. (Choose three.)
(a) Navigation.
(b) Privacy.
(c) Safety.
Question 51: What are the seven domains of the NIST Smart Grid Conceptual Model?
(a) Bulk generation, transmission, distribution, customer, market, operations, and service
provider.
(b) Bulk generation, innovation, distribution, customer, market, operations, and service provider.
(c) Bulk generation, transmission, distribution, customer, intelligence gathering, operations, and
service provider.
(d) Bulk generation, transmission, distribution, customer, market, risk management, and service
provider.
(a) Secure Transport API allows access to Apple's implementation of SSLv3, TLS versions 1.0
through 1.2, and DTLS 1.0.
(b) Secure Transport API impedes access to Apple's implementation of SSLv3, TLS versions 1.0
through 1.2, and DTLS 1.0.
Question 55: What are the two types of home automation using Arduino? (Choose two.)
Question 56: The Mirai attack is said to be blocked by rebooting the system. What do
experts say?
(b) Experts declare that rebooting might increase the aggression of the attack.
(c) Experts declare that rebooting does not exterminate Mirai, only postponing the attacks for a
while.
(d) They feel that rebooting could cause the attack to rebound on the attacker.
Question 59: Choose any two options into which Supervised Learning can be classified?
(Choose two.)
(a) Clustering.
(b) Regression.
(c) Classification.
(c) Random images and special characters used for machine learning algorithms.
Question 63: Which of these is not a step to build a deep learning model?
(c) Unplug the internet cable and shut down the infected machine immediately.
(d) Take some time to consider the next step once you suspect dubious activity.
Question 65: What are the benefits of a CRT device? (Choose any two.)
(a) Establish Drivers Phase, Profile Assets Phase, Identify Threats Phase, Risk Mitigation Phase.
(b) Identify Threats Phase, Establish Drivers Phase, Profile Assets Phase, Risk Mitigation Phase.
(c) Profile Assets Phase, Identify Threats Phase, Establish Drivers Phase, Risk Mitigation Phase.
(d) Risk Mitigation Phase, Establish Drivers Phase, Profile Assets Phase, Identify Threats Phase.
Question 67: Which are the functions that are considered for automation by security
analytics? (Choose two.)
Question 69: What are the inputs to be collected for dynamic input modelling? (Choose
two.)
Question 70: What are the aptitudes required for risk hunting in cybersecurity? (Choose
two.)
(b) Programming.
Question 71: Identify the correct definition of ‘group examination’ applied in AI systems.
(a) A system of testing interconnected servers that use geographical proximity as the main
criteria for distributing cached web content and web pages to users.
(b) A protocol designed for better security and improved page load times.
(c) A backpropagation technique employed in AI systems that helps to circulate the derivatives
backward from an output.
(d) A type of solo AI that propels AI search systems to make connections in huge swaths of
information.
Question 72: A factual procedure which comprises isolating groups of similar data points
dependent on specific qualities out of a larger arrangement of data, is called?
(a) Bunching.
Question 73: What is the role of Indicators of Compromise (IoCs) in the risk hunting
process?
(d) To locate DNS servers and their corresponding risk records for an organization.
Question 76: Which are the vulnerability tools that are frequently used?
Question 77: How does password-based user authentication create security challenges?
(Choose two.)
Question 78: Which are the international standards applicable to address authentication?
(Choose two.)
Question 80: Which are the system receptions that are granted passage by PowerShell?
(Choose two.)
Question 81: Which are the security technologies developed as a result of Generation 2
attacks? (Choose two.)
Question 82: Identify the advancements of the 5th-generation security apparatus. (Choose
two.)
(a) Consolidates advanced threat prevention solutions that share threat intelligence in real-time
with integrated architecture.
(a) WannaCry.
(b) NotPetya.
(d) Phishing.
Question 84: What are the objectives of driving digital payments? (Choose two.)
Question 85: How does the Unified Payment Interface (UPI) work?
(b) Phishing.
(c) Ransomware.
(d) DDoS.
Question 87: Which are the features of a graphical user interface? (Choose two.)
Question 91: Which is the method employed by cybercriminals to target servers and
domains, making digital services unavailable for users?
(a) WannaCry.
(c) Phishing.
(a) An attacker hacks into the email server of the targeted users.
(b) An attacker generates false domains and usernames identical to registered users.
(c) An attacker creates multiple login credentials and connects with the botnets.
(a) An assault where standard HTTP requests are sent to a focused web server, in which the
URIs require tedious calculations to deplete the resources of the specific web server.
(b) An assault on user credentials, rendering servers unavailable or showing them as overloaded
even when idle.
(c) An assault where there is a huge number of unregistered/false users and a consequential
reduction in network speed.
(d) An assault where users are flooded with suspicious emails and spam emails.
Question 95: What are the objectives of endpoint security management? (Choose two.)
Question 96: What are the salient features of endpoint security? (Choose two.)
Question 97: What is the main criterion for upgrading endpoint security clients?
(a) An initial client must be installed first, followed by the software blade package.
(b) The initial client and software blade package must be installed simultaneously.
(c) The full Disk Encryption Software Blade must be removed before any upgrade or installation.
Question 98: Which are the features of a graphical user interface? (Choose two.)