Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

A multinational law firm suffered a sophisticated malware attack that encrypted critical legal documents. During recovery, there is concern that some archived backups may already be compromised. Which recovery-focused action should the organization prioritize to ensure safe restoration?

Options:

A.

Perform comprehensive scans of all backup data using updated antivirus and heuristics.


B.

Deploy host-based firewalls and restrict outbound traffic.


C.

Restore services from live file shares synchronized with other offices.


D.

Wipe all endpoints completely before restoring files.


Expert Solution
Questions # 2:

Farheen is an incident responder at reputed IT Firm based in Florida. Farheen was asked to investigate a recent cybercrime faced by the organization. As part of this process, she collected static data from a victim system. She used DD tool command to perform forensic duplication to obtain an NTFS image of the original disk. She created a sector-by-sector mirror imaging of the disk and saved the output image file as image.dd.

Identify the static data collection process step performed by Farheen while collecting static data.

Options:

A.

Comparison


B.

Administrative consideration


C.

System preservation


D.

Physical presentatio


Expert Solution
Questions # 3:

Daniel, a SOC analyst, detects multiple incoming TCP requests to the organization’s mail server from different IPs. However, none of the requests complete the handshake. He suspects a potential attempt to exhaust server resources and confirms this with netstat logs. Which type of protocol-level incident is Daniel identifying?

Options:

A.

TCP session hijacking


B.

UDP reflection


C.

DNS cache poisoning


D.

SYN flood attack


Expert Solution
Questions # 4:

Sameer, part of the incident response team, is alerted that several employees unknowingly entered credentials on a fake login page after receiving a spoofed internal notification. The domain name used in the attack had subtle character changes. What kind of unauthorized access incident did this attack begin with?

Options:

A.

DNS footprinting


B.

Port scanning


C.

Social engineering


D.

ARP spoofing


Expert Solution
Questions # 5:

GlobalCorp, a leading software development company, recently launched a cloud-based CRM application. However, within a week, customers reported unauthorized access incidents. On investigation, it was discovered that the vulnerability was due to improper session management, allowing session fixation attacks. How should GlobalCorp address this vulnerability?

Options:

A.

Implement CAPTCHA on all login pages.


B.

Rotate session tokens after successful login.


C.

Increase the complexity of user passwords.


D.

Store session IDs in encrypted cookies.


Expert Solution
Questions # 6:

Which of the following is not a best practice to eliminate the possibility of insider attacks?

Options:

A.

Disable the users from installing unauthorized software or accessing malicious websites using the corporate network


B.

Monitor employee behaviors and the computer systems used by employees


C.

Implement secure backup and disaster recovery processes for business continuity


D.

Always leave business details over voicemail or email broadcast message


Expert Solution
Questions # 7:

Francis received a spoof email asking for his bank information. He decided to use a tool to analyze the email headers. Which of the following should he use?

Options:

A.

EventLog Analyzer


B.

MxTooIbox


C.

Email Checker


D.

PoliteMail


Expert Solution
Questions # 8:

Which of the following is a common tool used to help detect malicious internal or compromised actors?

Options:

A.

User behavior analytics


B.

SOC2 compliance report


C.

Log forward ng


D.

Syslog configuration


Expert Solution
Questions # 9:

Which of the following does NOT reduce the success rate of SQL injection?

Options:

A.

Close unnecessary application services and ports on the server.


B.

Automatically lock a user account after a predefined number of invalid login attempts within a predefined interval.


C.

Constrain legitimate characters to exclude special characters.


D.

Limit the length of the input field.


Expert Solution
Questions # 10:

The cybersecurity response team at a global enterprise receives an alert from an employee regarding a suspicious email that appears to be from a senior executive. During the investigation, the team analyzes the email header and notices that the sending IP address originates from a foreign country that has no affiliation with the organization. A WHOIS lookup confirms that the IP is registered under an unknown entity. What key element helped identify the suspicious activity?

Options:

A.

Bounce-back analysis


B.

Spam filter logs


C.

DKIM verification


D.

Originating IP trace


Expert Solution
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions