EC-Council 212-89 EC Council Certified Incident Handler (ECIH v2) Online Training
EC-Council 212-89 Online Training
The questions for 212-89 were last updated at Nov 23,2024.
- Exam Code: 212-89
- Exam Name: EC Council Certified Incident Handler (ECIH v2)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
John is performing a memory dump analysis in order to find traces of malware. He has employed Volatility tool in order to achieve his objective.
Which of the following volatility framework command she will use in order to analyze the running process from the memory dump?
- A . python vol.py hivelist-prof le=Win2008SP1x86 -f/root Desktop/memdump.mem
- B . python vol.py pslist-profile=Win2008SP1x86 -f/root/Desktop/memdump.mem
- C . python vol.py imageinfo -f/root/Desktop/memdump.mem
- D . python vol.py svcscan–profile=Win2008SP1x86 -f/root/Desktop/memdump.mem | more
Which of the following processes is referred to as an approach to respond to the security incidents that occur in an organization and enables the response team by ensuring that they know exactly what process to follow in case of security incidents?
- A . Vulnerability management
- B . Risk assessment
- C . Incident response orchestration
- D . Threat assessment
Which one of the following is the correct flow of the stages in an incident handling and response (IH&R) process?
- A . Preparation Incident recording Incident triage Containment Eradication Recovery Post-incident activities
- B . Incident recording Preparation Containment Incident triage Recovery Eradication Post-incident activities
- C . Containment Incident recording Incident triage Preparation Recovery Eradication Post-incident activities
- D . Incident t rage Eradication Containment Incident recording Preparation Recovery Post-incident activities
Which stage of the incident response and handling process involves auditing the system and network log files?
- A . Containment
- B . Incident disclosure
- C . Incident eradication
- D . Incident triage
Stanley is an incident handler working for TexaCorp., a United States based organization. With the growing concern of increasing emails from outside the organization, Stanley was asked to take appropriate actions to keep the security of the organization intact. In the process of detecting and containing malicious emails, Stanley was asked to check the validity of the emails received by employees. Identify the tool Stanley can use to accomplish this task.
- A . Email Dossier
- B . Point of Mail
- C . Polite Mail
- D . Event Log Analyzer
Which of the following is not the responsibility of first responders?
- A . Packaging and transporting the electronic evidence
- B . Protecting the crime scene
- C . Preserving temporary and fragile evidence and then shutdown or reboot the victim’s computer
- D . Identifying the crime scene
identify the network security incident where intended or authorized users are prevented from using system, network, or applications by flooding the network with a high volume of traffic that consumes all existing network resources.
- A . SQL injection
- B . URL manipulation
- C . XSS attack
- D . Denial-of-service
Multiple component incidents consist of a combination of two or more attacks in a system.
Which of the following is not a multiple component incident?
- A . An attacker infecting a machine to launch a DDoS attack
- B . An insider intentionally deleting files from a workstation
- C . An attacker redirecting user to a malicious website and infects his system with Trojan
- D . An attacker using email with malicious code to infect internal workstation
Otis is an incident handler working in the Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found the traces of an attack where proprietary information was stolen from the enterprise network and was passed on to their competitors.
Which of the following information security incidents did the Delmont organization face?
- A . Unauthorized access
- B . Network and resource abuses
- C . Email-based abuse
- D . Espionage
Which of the following methods help incident responders to reduce the false positive alert rates and further provide ben efts of focusing on top priority issues, thereby reducing potential risk and corporate liabilities?
- A . Threat contextualization
- B . Threat profiling
- C . Threat attribution
- D . Threat co relation