Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

In which of the following types of fuzz testing strategies the new data will be generated

from scratch and the amount of data to be generated are predefined based on the

testing model?

Options:

A.

Log-based fuzz testing


B.

Generation-based fuzz testing


C.

Mutation-based fuzz testing


D.

Protocol-based fuzz testing


Questions # 2:

Employee monitoring tools are mostly used by employers to find which of the following?

Options:

A.

Lost registry keys


B.

Conspiracies


C.

Malicious insider threats


D.

Stolen credentials


Questions # 3:

Adam is an attacker who along with his team launched multiple attacks on target organization for financial benefits. Worried about getting caught, he decided to forge

his identity. To do so, he created a new identity by obtaining information from different victims.

Identify the type of identity theft Adam has performed.

Options:

A.

Medical identity theft


B.

Tax identity theft


C.

Synthetic identity theft


D.

Social identity theft


Questions # 4:

Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked. Which of the following is the current policy that Rica identified?

Options:

A.

Prudent policy


B.

Paranoic policy


C.

Permissive policy


D.

Promiscuous policy


Questions # 5:

BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?

Options:

A.

Anti-forensics


B.

Adversarial mechanics


C.

Felony


D.

Legal hostility


Questions # 6:

Eric who is an incident responder is working on developing incident-handling plans and

procedures. As part of this process, he is performing analysis on the organizational

network to generate a report and to develop policies based on the acquired results.

Which of the following tools will help him in analyzing network and its related traffic?

Options:

A.

FaceNiff


B.

Wireshark


C.

Burp Suite


D.

Whois


Questions # 7:

An organization named Sam Morison Inc. decided to use cloud-based services to reduce

the cost of maintenance. The organization identified various risks and threats

associated with cloud service adoption and migrating business-critical data to thirdparty systems. Hence, the organization decided to deploy cloud-based security tools to

prevent upcoming threats.

Which of the following tools help the organization to secure the cloud resources and

services?

Options:

A.

Nmap


B.

Burp Suite


C.

Wireshark


D.

Alert Logic


Questions # 8:

QualTech Solutions is a leading security services enterprise. Dickson works as an incident responder with this firm. He is performing vulnerability assessment to identify

the security problems in the network, using automated tools to identify the hosts, services, and vulnerabilities present in the enterprise network.

Based on the above scenario, identify the type of vulnerability assessment performed by Dickson.

Options:

A.

Internal assessment


B.

Active assessment


C.

Passive assessment


D.

External assessment


Questions # 9:

Eric works as a system administrator at ABC organization and previously granted several users with access privileges to the organizations systems with unlimited permissions. These privileged users could prospectively misuse their rights unintentionally, maliciously, or could be deceived by attackers that could trick them to perform malicious activities. Which of the following guidelines would help incident handlers eradicate insider attacks by privileged users?

Options:

A.

Do not allow administrators to use unique accounts during the installation process


B.

Do not enable default administrative accounts to ensure accountability


C.

Do not control the access to administrator ano privileged users


D.

Do not use encryption methods to prevent, administrators and privileged users from accessing backup tapes and sensitive information


Questions # 10:

An organization implemented an encoding technique to eradicate SQL injection

attacks. In this technique, if a user submits a request using single-quote and some

values, then the encoding technique will convert it into numeric digits and letters

ranging from a to f. This prevents the user request from performing SQL injection

attempt on the web application.

Identify the encoding technique used by the organization.

Options:

A.

Unicode encoding


B.

Base64 encoding


C.

Hex encoding


D.

URL encoding


Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions