Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-89 - EC Council Certified Incident Handler (ECIH v3)

Page: 3 / 10
Total 305 questions

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

A.

AP misconfiguration

B.

Wardriving

C.

Rogue access point

D.

Ad hoc associations

ClobalTech, an avant-garde tech giant, became victim to a massive data breach. The perpetrator was identified as an inside employee who had been with the company for over a decade. The breach unveiled sensitive client data that severely tarnished the company's reputation. ClobalTech is now revamping its security strategy. What should be its primary emphasis?

A.

Monitor and restrict internet access for employees.

B.

Rotate employees between departments every year.

C.

Mandate monthly cybersecurity training for all employees.

D.

Implement behavioral analytics to scrutinize and detect abnormal employee activities.

Johnson an incident handler is working on a recent web application attack faced by the

organization. As part of this process, he performed data preprocessing in order to

analyzing and detecting the watering hole attack. He preprocessed the outbound

network traffic data collected from firewalls and proxy servers and started analyzing

the user activities within a certain time period to create time-ordered domain sequences

to perform further analysis on sequential patterns.

Identify the data-preprocessing step performed by Johnson.

A.

Filtering invalid host names

B.

Identifying unpopular domains

C.

Host name normalization

D.

User-specific sessionization

Stanley works as an incident responder at a top MNC based out of Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company.

While investigating the crime, he collected the evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of

jury so that the evidence explains the facts clearly and further helps in obtaining an expert opinion on the same to confirm the investigation process.

In the above scenario, what is the characteristic of the digital evidence Stanley tried to preserve?

A.

Believable

B.

Complete

C.

Authentic

D.

Admissible

The IT security team of a multinational corporation identifies a breach in its BYOD policy, with several employees' mobile devices infected with spyware through a malicious app. These devices had access to the corporate email system. What is the most immediate action the security team should take?

A.

Implement an enterprise mobility management (EMM) solution.

B.

Launch an awareness campaign on unauthorized apps.

C.

Disconnect the infected devices from the corporate network and initiate forensic analysis.

D.

Mandate a password reset for all corporate email accounts.

Which of the following details are included in the evidence bags?

A.

Error messages that contain sensitive information and files containing passworos

B.

Software version information and web application source code

C.

Sensitive cirectories, personal, and organizational email adcress

D.

Date and time of seizure, exhibit number, anc name of incident responder

NeuroNet, a pioneer in neural network research, identified an insider siphoning off critical research data. Post-investigation revealed employee dissatisfaction as the motive. To minimize such threats in the future, which measure should NeuroNet prioritize?

A.

Restrict all employees from accessing research data unless explicitly authorized.

B.

Conduct monthly one-on-one sessions between employees and HR.

C.

Implement a robust Data Loss Prevention (DLP) system.

D.

Introduce an anonymous feedback system for employees.

DeltaDynamics, a large-scale data analytics firm, found that one of its data scientists was sharing proprietary algorithms with external parties. The firm wishes to monitor its employees more closely without breaching privacy laws. What is the most effective measure it should consider?

A.

Use an advanced Employee Monitoring Tool that respects user privacy.

B.

Implement keystroke logging on all company devices.

C.

Install CCTV cameras in all workstations.

D.

Randomly inspect employee personal devices every week.

Joseph is an incident handling and response (IH&R) team lead in Toro Network Solutions Company. As a part of IH&R process, Joseph alerted the service providers,

developers, and manufacturers about the affected resources.

Identify the stage of IH&R process Joseph is currently in.

A.

Eradication

B.

Containment

C.

Incident triage

D.

Recovery

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

A.

Vulnerability assessment phase

B.

Post-investigation phase

C.

Pre-investigation phase

D.

Investigation phase