EC-Council 212-89 EC Council Certified Incident Handler (ECIH v2) Online Training
EC-Council 212-89 Online Training
The questions for 212-89 were last updated at Nov 23,2024.
- Exam Code: 212-89
- Exam Name: EC Council Certified Incident Handler (ECIH v2)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Which of the following information security personnel handles incidents from management and technical point of view?
- A . Network administrators
- B . Incident manager (IM)
- C . Forensic investigators
- D . Threat researchers
Which of the following information security personnel handles incidents from management and technical point of view?
- A . Network administrators
- B . Incident manager (IM)
- C . Forensic investigators
- D . Threat researchers
Which of the following information security personnel handles incidents from management and technical point of view?
- A . Network administrators
- B . Incident manager (IM)
- C . Forensic investigators
- D . Threat researchers
Which of the following information security personnel handles incidents from management and technical point of view?
- A . Network administrators
- B . Incident manager (IM)
- C . Forensic investigators
- D . Threat researchers
Which of the following information security personnel handles incidents from management and technical point of view?
- A . Network administrators
- B . Incident manager (IM)
- C . Forensic investigators
- D . Threat researchers
Which of the following information security personnel handles incidents from management and technical point of view?
- A . Network administrators
- B . Incident manager (IM)
- C . Forensic investigators
- D . Threat researchers
Create a vulnerability scan report
Identify the correct sequence of vulnerability assessment steps performed by the incident responders.
- A . 4–>1–>2->3->6->5–>7
- B . 3–>6–>1->2->5->4–>7
- C . 1–>3–>2->4->5->6–>7
- D . 2–>1–>4->7->5->6–>3
In which of the following phases of incident handling and response (IH&R) process are the identified security incidents analyzed, validated, categorized, and prioritized?
- A . Incident triage
- B . Notification
- C . Incident recording and assignment
- D . Containment
Browser data can be used to access various credentials.
Which of the following tools is used to analyze the history data files in Microsoft Edge browser?
- A . MZ History View
- B . Browsing History View
- C . Chrome History View
- D . MZ Cache View
Eve is an incident handler in ABC organization. One day, she got a complaint about an email hacking incident from one of the employees of the organization. As a part of incident handling and response process, she must follow a number of recovery steps in order to recover from the incident impact and maintain business continuity.
What is the first step that she must do to secure the employee’s account?
- A . Disabling automatic filesharing between the systems
- B . Restore the email services and change the password
- C . Enable scanning of links and attachments in all the emails
- D . Enable two-factor authentication