Leads4pass > EC-COUNCIL > EC-COUNCIL Certifications > 212-89 > 212-89 Online Practice Questions and Answers

212-89 Online Practice Questions and Answers

Questions 4

The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup of the infected system is carried out?

A. Containment

B. Eradication

C. Incident recording

D. Incident investigation

Buy Now
Questions 5

Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The personal computer of the criminal in question was confiscated by the county police. Which of the following evidence will lead John in his investigation?

A. SAM file

B. Web serve log

C. Routing table list

D. Web browser history

Buy Now
Questions 6

The largest number of cyber-attacks are conducted by: A. Insiders

B. Outsiders

C. Business partners

D. Suppliers

Buy Now
Questions 7

Which of the following can be considered synonymous:

A. Hazard and Threat

B. Threat and Threat Agent

C. Precaution and countermeasure

D. Vulnerability and Danger

Buy Now
Questions 8

CERT members can provide critical support services to first responders such as:

A. Immediate assistance to victims

B. Consolidated automated service process management platform

C. Organizing spontaneous volunteers at a disaster site

D. A + C

Buy Now
Questions 9

The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs is called:

A. Tripwire

B. HijackThis

C. Stinger

D. F-Secure Anti-virus

Buy Now
Questions 10

A software application in which advertising banners are displayed while the program is running that delivers ads to display pop-up windows or bars that appears on a computer screen or browser is called:

A. adware (spelled all lower case)

B. Trojan

C. RootKit

D. Virus

E. Worm

Buy Now
Questions 11

Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:

A. Outsider threats

B. Social Engineers

C. Insider threats

D. Zombies

Buy Now
Questions 12

Which of the following may be considered as insider threat(s):

A. An employee having no clashes with supervisors and coworkers

B. Disgruntled system administrators

C. An employee who gets an annual 7% salary raise

D. An employee with an insignificant technical literacy and business process knowledge

Buy Now
Questions 13

The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:

A. Computer Forensics

B. Digital Forensic Analysis

C. Forensic Readiness

D. Digital Forensic Policy

Buy Now
Exam Code: 212-89
Exam Name: EC-Council Certified Incident Handler (ECIH)
Last Update: Jan 10, 2025
Questions: 163
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99