Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with Dumpstech

Exam 212-89 Premium Access

View all detail and faqs for the 212-89 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

In which of the following stages of incident handling and response (IH&R) process do

the incident handlers try to find out the root cause of the incident along with the threat

actors behind the incidents, threat vectors, etc.?

Options:

A.

Post-incident activities

B.

Incident triage

C.

Evidence gathering and forensics analysis

D.

Incident recording and assignment

Questions # 22:

Dan is a newly appointed information security professional in a renowned organization. He is supposed to follow multiple security strategies to eradicate malware incidents. Which of the following is not considered as a good practice for maintaining information security and eradicating malware incidents?

Options:

A.

Do not download or execute applications from third-party sources

B.

Do not click on web browser pop-up windows

C.

Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on

D.

Do not download or execute applications from trusted sources

Questions # 23:

Which of the following is the BEST method to prevent email incidents?

Options:

A.

Installing antivirus rule updates

B.

Disabling HTML in email content fields

C.

Web proxy filtering

D.

End-user training

Questions # 24:

SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?

Options:

A.

Private key infrastructure

B.

Private key in for ma lion

C.

Public key information

D.

Public key infrastructure

Questions # 25:

In an online retail company, a severe security incident occurred where attackers exploited a zero-day vulnerability in the website's backend. This exploit allowed the theft of thousands of customers' credit card details. While the tech team races to patch the vulnerability, what should be the primary focus of the IH&R team?

Options:

A.

Coordinating with financial institutions to monitor suspicious transactions.

B.

Commencing legal actions against the attackers.

C.

Immediately emailing all customers advising them to cancel cards.

D.

Analyzing server logs using Incident Response Automation and Orchestration tools to understand the breach's origin.

Questions # 26:

A social media analytics company uses a cloud-based platform to deploy and manage modular workloads. Following an alert in a background module, the incident response team began log analysis and configuration reviews. While they had access to deployment artifacts and resource usage settings, they lacked visibility into system-level activity, such as task scheduling and component runtime behavior. This information is needed to determine whether the issue originated from the underlying cloud environment. Who holds primary responsibility for providing such access in this cloud model to support the investigation?

Options:

A.

The internal DevOps team, which manages deployment processes and resource configuration.

B.

The cloud security operations team, which oversees user activity and investigates endpoint anomalies.

C.

The cloud service provider, which controls the orchestration framework and operational monitoring layers.

D.

The cloud application team, which handles business logic and data flow within modular components.

Questions # 27:

FinFusion, a leading finance firm, discovered a slow leak of financial data over several months. Surprisingly, the leak was attributed to a high-ranking executive who was selling data to competitors. Keen on avoiding future breaches, what should be FinFusion's foremost action?

Options:

A.

Use advanced Employee Monitoring Tools that offer real-time threat alerts.

B.

Limit executive access to sensitive databases.

C.

Require weekly reports from executives on their data access and usage.

D.

Install security cameras in executive offices.

Questions # 28:

A multinational law firm suffered a sophisticated malware attack that encrypted critical legal documents. During recovery, there is concern that some archived backups may already be compromised. Which recovery-focused action should the organization prioritize to ensure safe restoration?

Options:

A.

Perform comprehensive scans of all backup data using updated antivirus and heuristics.

B.

Deploy host-based firewalls and restrict outbound traffic.

C.

Restore services from live file shares synchronized with other offices.

D.

Wipe all endpoints completely before restoring files.

Questions # 29:

Daniel, a SOC analyst, detects multiple incoming TCP requests to the organization’s mail server from different IPs. However, none of the requests complete the handshake. He suspects a potential attempt to exhaust server resources and confirms this with netstat logs. Which type of protocol-level incident is Daniel identifying?

Options:

A.

TCP session hijacking

B.

UDP reflection

C.

DNS cache poisoning

D.

SYN flood attack

Questions # 30:

DeltaCorp, a global e-commerce company, received an email sent to the financial department claiming to be from the CEO, requesting an urgent transfer of funds. To determine the legitimacy of this potentially deceptive email, which of the following should be the primary focus of the investigation?

Options:

A.

Inspect the email headers for spoofing or sender IP irregularities.

B.

Contact the vendor mentioned in the email.

C.

Review past emails for similar language.

D.

Scan the email server for malware.

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions