Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is a standard framework that provides recommendations for implementing information security controls for organizations that initiate, implement, or maintain information security management systems (ISMSs)?

Options:

A.

ISO/IEC 27002


B.

ISO/IEC 27035


C.

PCI DSS


D.

RFC 219G


Expert Solution
Questions # 12:

David, an incident responder, investigates an email-based breach where the CFO's email account was compromised and used to send invoice modification requests to vendors. Logs reveal the attacker accessed the account using valid credentials after the CFO clicked on a fake Microsoft 365 login prompt sent via email. Which technique did the attacker most likely use?

Options:

A.

Mail bombing


B.

Pharming


C.

Spimming


D.

Spear phishing


Expert Solution
Questions # 13:

Jason, a cybersecurity analyst in the incident response team, begins investigating several complaints from employees who received emails urgently requesting wire transfers to an overseas account. The emails appeared to come from the company’s CEO, using a tone of authority and pressure to bypass standard procedures. Upon closer inspection, Jason identifies that the sender's email address includes a minor alteration in the domain name—a form of domain spoofing. He examines the email headers, confirms the falsified sender identity, and cross-checks with the actual CEO’s activity logs to ensure there was no internal compromise. Immediately, Jason blocks the sender’s IP address at the firewall level, alerts the finance department to prevent any unauthorized transactions, and issues a company-wide advisory about the impersonation attempt. What type of phishing is Jason handling?

Options:

A.

Whaling


B.

Mail bombing


C.

Credential stuffing


D.

Spimming


Expert Solution
Questions # 14:

An IT security analyst at a logistics firm is alerted to unusual outbound traffic originating from an employee’s mobile device connected to the corporate VPN. Antivirus scans fail to remove the malware, indicating persistence. The organization cannot afford further data leakage. Which action should the incident handler take next?

Options:

A.

Disable the SIM card.


B.

Switch the device to airplane mode.


C.

Perform a factory reset or reinstall the mobile OS.


D.

Restrict background app refresh for social apps.


Expert Solution
Questions # 15:

Which of the following is a term that describes the combination of strategies and services intended to restore data, applications, and other resources to the public cloud or dedicated service providers?

Options:

A.

Mitigation


B.

Analysis


C.

Eradication


D.

Cloud recovery


Expert Solution
Questions # 16:

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.

Options:

A.

3-->6-->1-->2-->5-->4-->7


B.

1-->3-->2-->4-->5-->6-->7


C.

4-->1-->2-->3-->6-->5-->7


D.

2-->1-->4-->7-->5-->6-->3


Expert Solution
Questions # 17:

ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?

Options:

A.

Slowloris attack


B.

UDP flood attack


C.

SYN flood attack


D.

Ping of ceath


Expert Solution
Questions # 18:

AlphaTech, a cloud-based storage company, recently suffered data leakage. Investigation revealed an employee sent sensitive client data to a personal email. AlphaTech wants to implement a solution to monitor and prevent such incidents. What should they prioritize?

Options:

A.

Mandate employees to attend cyber hygiene workshops every month.


B.

Implement a Data Loss Prevention (DLP) tool to monitor sensitive data movement.


C.

Limit email attachments to SMB for all employees.


D.

Block all personal email domains on the company network.


Expert Solution
Questions # 19:

Which one of the following is Inappropriate Usage Incidents?

Options:

A.

Insider Threat


B.

Reconnaissance Attack


C.

Access Control Attack


D.

Denial of Service Attack


Expert Solution
Questions # 20:

Which of the following email security tools can be used by an incident handler to

prevent the organization against evolving email threats?

Options:

A.

Email Header Analyzer


B.

G Suite Toolbox


C.

MxToolbox


D.

Gpg4win


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions