Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with Dumpstech

Exam 212-89 Premium Access

View all detail and faqs for the 212-89 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

Options:

A.

Cache

B.

Disk

C.

Emails

D.

Temp files

Questions # 12:

Bran is an incident handler who is assessing the network of the organization. In the

process, he wants to detect ping sweep attempts on the network using Wireshark tool.

Which of the following Wireshark filter he must use to accomplish this task?

Options:

A.

icmp.seq

B.

icmp.redir_gw

C.

icmp.type==8

D.

icmp.ident

Questions # 13:

An organization named Sam Morison Inc. decided to use cloud-based services to reduce

the cost of maintenance. The organization identified various risks and threats

associated with cloud service adoption and migrating business-critical data to thirdparty systems. Hence, the organization decided to deploy cloud-based security tools to

prevent upcoming threats.

Which of the following tools help the organization to secure the cloud resources and

services?

Options:

A.

Nmap

B.

Burp Suite

C.

Wireshark

D.

Alert Logic

Questions # 14:

GlobalCorp, a leading software development company, recently launched a cloud-based CRM application. However, within a week, customers reported unauthorized access incidents. On investigation, it was discovered that the vulnerability was due to improper session management, allowing session fixation attacks. How should GlobalCorp address this vulnerability?

Options:

A.

Implement CAPTCHA on all login pages.

B.

Rotate session tokens after successful login.

C.

Increase the complexity of user passwords.

D.

Store session IDs in encrypted cookies.

Questions # 15:

The IT security team of a multinational corporation identifies a breach in its BYOD policy, with several employees' mobile devices infected with spyware through a malicious app. These devices had access to the corporate email system. What is the most immediate action the security team should take?

Options:

A.

Implement an enterprise mobility management (EMM) solution.

B.

Launch an awareness campaign on unauthorized apps.

C.

Disconnect the infected devices from the corporate network and initiate forensic analysis.

D.

Mandate a password reset for all corporate email accounts.

Questions # 16:

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

Options:

A.

AP misconfiguration

B.

Wardriving

C.

Rogue access point

D.

Ad hoc associations

Questions # 17:

Which of the following terms refers to an organization’s ability to make optimal use of digital evidence in a limited period of time and with minimal investigation costs?

Options:

A.

Threat assessment

B.

Data analysis

C.

Risk assessment

D.

Forensic readiness

Questions # 18:

Which of the following risk mitigation strategies involves execution of controls to

reduce the risk factor and brings it to an acceptable level or accepts the potential risk

and continues operating the IT system?

Options:

A.

Risk assumption

B.

Risk avoidance

C.

Risk planning

D.

Risk transference

Questions # 19:

OmegaTech Corp identified unauthorized remote access to its primary server and data exfiltration tunnels. Simultaneously, IoT device firmware corruption was reported. As the first responder, what should Olivia prioritize?

Options:

A.

Start reinstalling IoT firmware

B.

Begin isolating the primary server and cutting off remote access

C.

Alert all divisions to initiate a system-wide shutdown

D.

Engage the AI-driven security system to trace unauthorized access

Questions # 20:

A cloud security analyst identifies a complex multi-vector attack targeting cloud-hosted applications (DDoS + phishing + malware infiltration). In cloud incident handling, what is the most critical challenge to overcome to respond effectively?

Options:

A.

Ensuring compliance with financial industry regulations while responding.

B.

Communicating effectively with the cloud service provider to understand scope.

C.

Differentiating between legitimate traffic and attack traffic to minimize disruption.

D.

Coordinating response efforts across different cloud services and platforms.

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions