EC-Council 212-89 EC Council Certified Incident Handler (ECIH v2) Online Training
EC-Council 212-89 Online Training
The questions for 212-89 were last updated at Nov 23,2024.
- Exam Code: 212-89
- Exam Name: EC Council Certified Incident Handler (ECIH v2)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
- A . Live data acquisition
- B . Validate data acquisition
- C . Remote data acquisition
- D . Static data acquisition
Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption
Identify the correct sequence of steps involved in forensic readiness planning.
- A . 2–>3–>1->4->6->5–>7–>8
- B . 3–>4–>8->7->6->1–>2–>5
- C . 3–>1–>4->5->8->2–>6–>7
- D . 1–>2–>3->4->5->6–>7–>8
Jacobi san employee in Dolphin Investment firm. While he was on his duty, he identified that his computer is facing some problems and he wanted to convey the issue to the respective authority in his organization.
But currently this organization does not have a ticketing system to address such types of issues.
In the above scenario, which of the following ticketing systems can be employed by the Dolphin Investment firm to allow Jacob to raise the issue in order to tell the respective team about the incident?
- A . ThreatConnec
- B . IBM XForce Exchange
- C . ManageEngine ServiceDesk Plus
- D . MISP
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the users information and system. These programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.
- A . Virus
- B . Adware
- C . Worm
- D . Trojan