Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-89 Exam Dumps - EC Council Certified Incident Handler (ECIH v3)

Searching for workable clues to ace the ECCouncil 212-89 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 212-89 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Stanley works as an incident responder at a top MNC based out of Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company.

While investigating the crime, he collected the evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of

jury so that the evidence explains the facts clearly and further helps in obtaining an expert opinion on the same to confirm the investigation process.

In the above scenario, what is the characteristic of the digital evidence Stanley tried to preserve?

A.

Believable

B.

Complete

C.

Authentic

D.

Admissible

Full Access
Question # 10

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

A.

Cache

B.

Disk

C.

Emails

D.

Temp files

Full Access
Question # 11

Francis is an incident handler and security expert. He works at MorisonTech Solutions based in Sydney, Australia. He was assigned a task to detect phishing/spam mails for the client organization.

Which of the following tools can assist Francis to perform the required task?

A.

Netcraft

B.

Nessus

C.

BTCrack

D.

Cain and Abel

Full Access
Question # 12

Matt is an incident handler working for one of the largest social network companies, which was affected by malware. According to the company’s reporting timeframe guidelines, a malware incident should be reported within 1 h of discovery/detection after its spread across the company. Which category does this incident belong to?

A.

CAT 1

B.

CAT 4

C.

CAT 2

D.

CAT 3

Full Access
Question # 13

The IT security team of a multinational corporation identifies a breach in its BYOD policy, with several employees' mobile devices infected with spyware through a malicious app. These devices had access to the corporate email system. What is the most immediate action the security team should take?

A.

Implement an enterprise mobility management (EMM) solution.

B.

Launch an awareness campaign on unauthorized apps.

C.

Disconnect the infected devices from the corporate network and initiate forensic analysis.

D.

Mandate a password reset for all corporate email accounts.

Full Access
Question # 14

Tyler, a system administrator, notices high CPU usage and unknown processes on a workstation used to download unauthorized applications. Which indicator best describes this inappropriate usage incident?

A.

Attack against an external party

B.

Unauthorized service usage

C.

Inappropriate resource usage

D.

Access to inappropriate materials

Full Access
Question # 15

Eve’s is an incident handler in ABC organization. One day, she got a complaint about email hacking incident from one of the employees of the organization. As a part of

incident handling and response process, she must follow many recovery steps in order to recover from incident impact to maintain business continuity.

What is the first step that she must do to secure employee account?

A.

Restore the email services and change the password

B.

Enable two-factor authentication

C.

Enable scanning of links and attachments in all the emails

D.

Disabling automatic file sharing between the systems

Full Access
Question # 16

Which of the following is an Inappropriate usage incident?

A.

Access-control attack

B.

Reconnaissance attack

C.

Insider threat

D.

Denial-of-service attack

Full Access
Go to page: