Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Zaimasoft, a prominent IT organization, was attacked by perpetrators who directly targeted the hardware and caused irreversible damage to the hardware. In result, replacing or reinstalling the hardware was the only solution.

Identify the type of denial-of-service attack performed on Zaimasoft.

Options:

A.

ddos


B.

DoS


C.

PDoS


D.

DRDoS


Expert Solution
Questions # 12:

Chandler is a professional hacker who is targeting Technote organization. He wants to obtain important organizational information that is being transmitted between

different hierarchies. In the process, he is sniffing the data packets transmitted through the network and then analyzing them to gather packet details such as network, ports,

protocols, devices, issues in network transmission, and other network specifications. Which of the following tools Chandler must employ to perform packet analysis?

Options:

A.

BeEf


B.

IDAPro


C.

Omnipeek


D.

shARP


Expert Solution
Questions # 13:

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.

Cross-site scripting


B.

Insecure direct object references


C.

Cross-site request forgery


D.

SQL injection


Expert Solution
Questions # 14:

Which of the following risk mitigation strategies involves the execution of controls to reduce the risk factor and bring it to an acceptable level, or accepts the potential risk and continues operating the IT system?

Options:

A.

Risk avoidance


B.

Risk assumption


C.

Risk transference


D.

Risk planning


Expert Solution
Questions # 15:

Matt is an incident handler working for one of the largest social network companies, which was affected by malware. According to the company’s reporting timeframe guidelines, a malware incident should be reported within 1 h of discovery/detection after its spread across the company. Which category does this incident belong to?

Options:

A.

CAT 1


B.

CAT 4


C.

CAT 2


D.

CAT 3


Expert Solution
Questions # 16:

Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To acccomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources (processor cache) to steal data (cryptographic key/plain text secrets) from the victim machine. Identify the type of attack Alice is performing in the above scenario.

Options:

A.

Side channel attack


B.

Service hijacking


C.

SQL injection attack


D.

Man-in-the-cloud attack


Expert Solution
Questions # 17:

Darwin is an attacker residing within the organization and is performing network

sniffing by running his system in promiscuous mode. He is capturing and viewing all

the network packets transmitted within the organization. Edwin is an incident handler

in the same organization.

In the above situation, which of the following Nmap commands Edwin must use to

detect Darwin’s system that is running in promiscuous mode?

Options:

A.

nmap -sV -T4 -O -F –version-light


B.

nmap –sU –p 500


C.

nmap --script=sniffer-detect [Target IP Address/Range of IP addresses]


D.

nmap --script hostmap


Expert Solution
Questions # 18:

According to NITS, what are the 5 main actors in cloud computing?

Options:

A.

Provider, carrier, auditor, broker, and seller


B.

Consumer, provider, carrier, auditor, ano broker


C.

Buyer, consumer, carrier, auditor, and broker


D.

None of these


Expert Solution
Questions # 19:

Eric is an incident responder and is working on developing incident-handling plans and procedures. As part of this process, he is performing an analysis on the organizational network to generate a report and develop policies based on the acquired results. Which of the following tools will help him in analyzing his network and the related traffic?

Options:

A.

Whois


B.

Burp Suite


C.

FaceNiff


D.

Wireshark


Expert Solution
Questions # 20:

Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?

Options:

A.

Campaign attribution


B.

True attribution


C.

Nation-state attribution


D.

Intrusion set attribution


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions