Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 37 Topic 4 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 37 Topic 4 Discussion

212-89 Exam Topic 4 Question 37 Discussion:
Question #: 37
Topic #: 4

A ransomware attack recently disrupted operations at a manufacturing facility, specifically targeting its IoT-integrated conveyor system. While attempting to recover from the incident, the incident response team discovered that the available backups were incomplete—several critical sensor logs and control commands were missing, which caused delays in restoring device functions and syncing with other systems. The team concludes that relying on traditional backup routines alone is insufficient for restoring full IoT functionality after an attack. Which strategy would best prevent such issues in future recovery efforts?


A.

Use long-term tape archival for all IoT firmware images.


B.

Store historical sensor logs in compressed ZIP archives on shared drives.


C.

Schedule periodic external hard drive backups for operator terminals.


D.

Maintain synchronized cloud replicas of critical IoT resources.


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.