Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

After a recent upgrade, users of Trend Spot encountered slow website load times. Analysis revealed attackers flooding the application with fake search requests, causing an application-layer DoS attack. How should Trend Spot primarily respond?

Options:

A.

Regularly clear the server cache.


B.

Shift to a more robust hosting provider.


C.

Introduce rate limiting on search request functionality.


D.

Implement IP address-based blocking for suspicious traffic.


Expert Solution
Questions # 2:

During routine monitoring, a cloud-based application hosting provider detects an anomaly suggesting an ongoing DDoS attack targeting one of its hosted applications. The provider's incident response team must quickly mitigate the attack while ensuring minimal service disruption. Which of the following strategies should they prioritize?

Options:

A.

Immediately scale up application resources to absorb the attack impact.


B.

Enable geo-restriction to block incoming traffic from regions not serviced by the application.


C.

Temporarily take the affected application offline to stop the attack.


D.

Implement rate limiting and challenge-response tests to differentiate between legitimate and malicious traffic.


Expert Solution
Questions # 3:

Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked. Which of the following is the current policy that Rica identified?

Options:

A.

Prudent policy


B.

Paranoic policy


C.

Permissive policy


D.

Promiscuous policy


Expert Solution
Questions # 4:

A large insurance enterprise recently completed an internal phishing simulation to evaluate its incident reporting workflow. Upon reviewing the ticketing system logs, the IR lead discovered that several phishing-related reports submitted by employees had been mistakenly logged as routine IT service requests. This misrouting prevented timely review by the IH&R team, delaying appropriate follow-up actions.

The root cause was traced to frontline support staff misinterpreting subtle incident indicators as generic technical issues. Recognizing the potential risk this poses to early issue detection, the Chief Information Security Officer directed an overhaul of the alert-handling procedures. This included refining the reporting workflow, embedding clearer triage rules within the ticketing platform, and initiating refresher training to strengthen tier-one decision-making when handling ambiguous user reports. Which IR concern is being addressed through this corrective action?


Expert Solution
Questions # 5:

Following a high-profile breach investigation at a multinational corporation, an incident handler is tasked with the critical role of preserving, packaging, and transporting digital evidence from a server believed to be compromised and utilized as part of a global botnet operation. The challenge lay not only in the technical complexities of the operation but also in adhering to stringent legal and procedural frameworks to ensure the evidence remained admissible in court. Which of the following options ensures the highest level of evidence integrity during its transport?

Options:

A.

On-site encryption of the server’s data, followed by its upload to secure cloud storage.


B.

Creating a forensic image of the server's drives, verifying image hashes, storing images on encrypted drives, and maintaining detailed transport logs.


C.

Encasing the server in anti-static packaging with chain-of-custody labels.


D.

Transferring server data to a new drive using a write blocker and GPS tracking.


Expert Solution
Questions # 6:

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.

Cross-site scripting


B.

Insecure direct object references


C.

Cross-site request forgery


D.

SQL injection


Expert Solution
Questions # 7:

John, a professional hacker, is attacking an organization, where he is trying to destroy the connectivity between an AP and client to make the target unavailable to other

wireless devices.

Which of the following attacks is John performing in this case?

Options:

A.

Routing attack


B.

EAP failure


C.

Disassociation attack


D.

Denial-of-service


Expert Solution
Questions # 8:

Stanley works as an incident responder at a top MNC based in Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company. While investigating the incident, he collected evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of a jury so that the evidence clarifies the facts and further helps in obtaining an expert opinion on the incident to confirm the investigation process. In the above scenario, which of the following characteristics of the digital evidence did Stanley attempt to preserve?

Options:

A.

Completeness


B.

Admissibility


C.

Believability


D.

Authenticity


Expert Solution
Questions # 9:

Andrew, an incident responder, is performing risk assessment of the client organization.

As a part of risk assessment process, he identified the boundaries of the IT systems,

along with the resources and the information that constitute the systems.

Identify the risk assessment step Andrew is performing.

Options:

A.

Control analysis


B.

System characterization


C.

Likelihood determination


D.

Control recommendations


Expert Solution
Questions # 10:

Your company sells SaaS, and your company itself is hosted in the cloud (using it as a PaaS). In case of a malware incident in your customer's database, who is responsible for eradicating the malicious software?

Options:

A.

Your company


B.

Building management


C.

The PaaS provider


D.

The customer


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions