EC-Council 212-89 EC Council Certified Incident Handler (ECIH v2) Online Training
EC-Council 212-89 Online Training
The questions for 212-89 were last updated at Nov 23,2024.
- Exam Code: 212-89
- Exam Name: EC Council Certified Incident Handler (ECIH v2)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique.
Identify the type of attack John is performing on the target organization.
- A . Pharming
- B . Skimming
- C . War driving
- D . Pre texting
Dash wants to perform a DoS attack over 256 target URLs simultaneously.
Which of the following tools can Dash employ to achieve his objective?
- A . Ollydbg
- B . IDA Pro
- C . HOIC
- D . Open VAS
Andrew, an incident responder, is performing risk assessment of the client organization. As a part of the risk assessment process, he identified the boundaries of the IT systems, along with the resources and the information that constitute the systems.
Identify the risk assessment step Andrew is performing.
- A . Likelihood determination
- B . System characterization
- C . Control analysis
- D . Control recommendations
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition