Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 212-89 - EC Council Certified Incident Handler (ECIH v3)

Page: 4 / 6
Total 172 questions

Which of the following best describes an email issued as an attack medium, in which several messages are sent to a mailbox to cause overflow?

A.

Email-bombing

B.

Masquerading

C.

Spoofing

D.

Smurf attack

Which of the following is a common tool used to help detect malicious internal or compromised actors?

A.

User behavior analytics

B.

SOC2 compliance report

C.

Log forward ng

D.

Syslog configuration

Identify Sarbanes–Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of

securities analysts.

A.

Title VIII: Corporate and Criminal Fraud Accountability

B.

Title V: Analyst Conflicts of Interest

C.

Title VII: Studies and Reports

D.

Title IX: White-Collar-Crime Penalty Enhancement

Chandler is a professional hacker who is targeting Technote organization. He wants to obtain important organizational information that is being transmitted between

different hierarchies. In the process, he is sniffing the data packets transmitted through the network and then analyzing them to gather packet details such as network, ports,

protocols, devices, issues in network transmission, and other network specifications. Which of the following tools Chandler must employ to perform packet analysis?

A.

BeEf

B.

IDAPro

C.

Omnipeek

D.

shARP

ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?

A.

Slowloris attack

B.

UDP flood attack

C.

SYN flood attack

D.

Ping of ceath

Which of the following is a type of malicious code or software that appears legitimate but can take control of your computer?

A.

Phishing attack

B.

DDoS

C.

Trojan attack

D.

Password attack

Which of the following techniques prevent or mislead incident-handling process and may also affect the collection, preservation, and identification phases of the forensic

investigation process?

A.

Scanning

B.

Footprinting

C.

Enumeration

D.

Anti-forensics

Robert is an incident handler working for Xsecurity Inc. One day, his organization

faced a massive cyberattack and all the websites related to the organization went

offline. Robert was on duty during the incident and he was responsible to handle the

incident and maintain business continuity. He immediately restored the web application

service with the help of the existing backups.

According to the scenario, which of the following stages of incident handling and

response (IH&R) process does Robert performed?

A.

Evidence gathering and forensics analysis

B.

Eradication

C.

Notification

D.

Recovery

QualTech Solutions is a leading security services enterprise. Dickson works as an incident responder with this firm. He is performing vulnerability assessment to identify

the security problems in the network, using automated tools to identify the hosts, services, and vulnerabilities present in the enterprise network.

Based on the above scenario, identify the type of vulnerability assessment performed by Dickson.

A.

Internal assessment

B.

Active assessment

C.

Passive assessment

D.

External assessment

Which of the following has been used to evade IDS and IPS?

A.

Fragmentation

B.

TNP

C.

HTTP

D.

SNMP