Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-89 - EC Council Certified Incident Handler (ECIH v3)

Page: 7 / 10
Total 305 questions

TechStream, a rising tech start-up, developed an AI-powered chatbot for its clients’ websites. Shortly after deployment, users reported receiving malicious links and phishing messages from the chatbot. Preliminary investigation traced the issue to an attacker exploiting the chatbot's AI training module. Which of the following steps would be the most efficient in addressing this vulnerability?

A.

Introducing CAPTCHA challenges before users can interact with the chatbot.

B.

Implementing strict input validation for any data fed to the chatbot.

C.

Disabling the chatbot until a complete security review is done.

D.

Limiting the chatbot’s ability to share links or external content.

Francis is an incident handler and security expert. He works at MorisonTech Solutions based in Sydney, Australia. He was assigned a task to detect phishing/spam mails for the client organization.

Which of the following tools can assist Francis to perform the required task?

A.

Netcraft

B.

Nessus

C.

BTCrack

D.

Cain and Abel

Which of the following options describes common characteristics of phishing emails?

A.

Written in French

B.

Sent from friends or colleagues

C.

Urgency, threatening, or promising subject lines

D.

No BCC fields

Dash wants to perform a DoS attack over 256 target URLs simultaneously.

Which of the following tools can Dash employ to achieve his objective?

A.

HOIC

B.

IDAPro

C.

Ollydbg

D.

OpenVAS

A US Federal Agency network was the target of a DoS attack that prevented and

impaired the normal authorized functionality of the networks. According to agency’s

reporting timeframe guidelines, this incident should be reported within 2 h of

discovery/detection if the successful attack is still ongoing and the agency is unable to

successfully mitigate the activity.

Which incident category of US Federal Agency does this incident belong to?

A.

CAT 6

B.

CAT 2

C.

CAT 1

D.

CAT 5

Ethan, an incident handler, reviews traffic logs showing abnormal connections from internal devices to high-risk external domains. He traces these back to a misconfigured IoT device using outdated firmware. What kind of indicator was key in identifying the issue?

A.

Large ICMP payloads

B.

Unauthorized ARP broadcast

C.

Suspicious outbound connections

D.

Incorrect DNS caching

An organization implemented an encoding technique to eradicate SQL injection

attacks. In this technique, if a user submits a request using single-quote and some

values, then the encoding technique will convert it into numeric digits and letters

ranging from a to f. This prevents the user request from performing SQL injection

attempt on the web application.

Identify the encoding technique used by the organization.

A.

Unicode encoding

B.

Base64 encoding

C.

Hex encoding

D.

URL encoding

During routine checks, EduSoft, an educational software provider, identified malware within their digital examination tools. This malware not only provided answers to students but mined personal data. With a digital forensic tool and an encryption protocol tool, what's the ideal primary action?

A.

Disable the examination tool until further notice.

B.

Alert educational institutions about the compromised software.

C.

Use the forensic tool to ascertain the malware's source and method of operation.

D.

Deploy the encryption tool to safeguard students' data.

The cybersecurity response team at a global enterprise receives an alert from an employee regarding a suspicious email that appears to be from a senior executive. During the investigation, the team analyzes the email header and notices that the sending IP address originates from a foreign country that has no affiliation with the organization. A WHOIS lookup confirms that the IP is registered under an unknown entity. What key element helped identify the suspicious activity?

A.

Bounce-back analysis

B.

Spam filter logs

C.

DKIM verification

D.

Originating IP trace

Which of the following are malicious software programs that infect computers and corrupt or delete the data on them?

A.

Worms

B.

Trojans

C.

Spyware

D.

Virus