Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 35 Topic 4 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 35 Topic 4 Discussion

212-89 Exam Topic 4 Question 35 Discussion:
Question #: 35
Topic #: 4

A cybersecurity team at a financial services firm detects abnormal behavior on several endpoints, suggesting a possible breach. The anomalies include unexpected data transfers and processes running with unusual permissions. Given the potential impact, the team needs to quickly validate whether these are indicators of a security incident or benign anomalies. What method should the team prioritize to detect and validate the incident effectively?


A.

Utilize an advanced behavioral analysis tool to differentiate between legitimate and malicious activities.


B.

Implement strict access control measures to limit permissions on all endpoints immediately.


C.

Disconnect the affected endpoints from the network to prevent potential data exfiltration.


D.

Engage an external cybersecurity consultancy to conduct an independent assessment.


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.