Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

Smith employs various malware detection techniques to thoroughly examine the

network and its systems for suspicious and malicious malware files. Among all

techniques, which one involves analyzing the memory dumps or binary codes for the

traces of malware?

Options:

A.

Live system


B.

Dynamic analysis


C.

Intrusion analysis


D.

Static analysis


Expert Solution
Questions # 22:

Allan performed a reconnaissance attack on his corporate network as part of a red-team activity. He scanned the IP range to find live host IP addresses. What type of technique did he use to exploit the network?

Options:

A.

DNS foot printing


B.

Social engineering


C.

Port scanning


D.

Ping sweeping


Expert Solution
Questions # 23:

During an incident involving suspected unauthorized data access, Sophia, a system administrator, immediately isolates the affected system from the network to prevent further communication. She ensures no one tampers with the device, restricts access to the area, and notifies the incident response team. What role is Sophia performing as a first responder?

Options:

A.

Documenting the chain of custody


B.

Collecting detailed evidence logs


C.

Performing advanced forensic analysis


D.

Protecting the integrity of the crime scene


Expert Solution
Questions # 24:

AlphaTech recently discovered signs of an advanced persistent threat (APT) in its infrastructure. The incident response team is trying to gather more information about the threat to form a comprehensive response strategy. While leveraging threat intelligence platforms, which of the following approaches would be most effective in gathering detailed and actionable insights about the APT?

Options:

A.

Searching for IOCs related to known APT campaigns and comparing them with observed patterns.


B.

Collaborating with industry peers to understand similar threats and observed TTPs.


C.

Obtaining historical data on common cyber threats to predict future movements.


D.

Gathering information from open-source forums and integrating it internally.


Expert Solution
Questions # 25:

For analyzing the system, the browser data can be used to access various credentials.

Which of the following tools is used to analyze the history data files in Microsoft Edge browser?

Options:

A.

ChromeHistoryView


B.

BrowsingHistoryView


C.

MZCacheView


D.

MZHistoryView


Expert Solution
Questions # 26:

Which of the following is a technique used by attackers to make a message difficult to understand through the use of ambiguous language?

Options:

A.

Steganography


B.

Spoofing


C.

Encryption


D.

Obfuscation


Expert Solution
Questions # 27:

Post an upgrade in their global communication systems, NewsNet Corp., a media conglomerate, experienced anomalies. Subsequent analysis revealed malware that subtly altered news content, skewing information. Having an AI-based content checker and a network segregation tool, what's the immediate approach?

Options:

A.

Notify viewers about potential misinformation.


B.

Segregate affected networks, isolating the compromised systems.


C.

Use the AI checker to identify and correct skewed content.


D.

Roll back the global communication system's upgrade.


Expert Solution
Questions # 28:

A large healthcare provider with an extensive network of endpoints experiences a significant ransomware attack encrypting critical patient data. What underscores the importance of an effective endpoint security incident handling and response framework in this context?

Options:

A.

The necessity of maintaining operational continuity in healthcare services to ensure patient care.


B.

The requirement to report the incident to regulatory bodies within a specified timeframe.


C.

The need to overhaul the entire IT infrastructure post-incident.


D.

The potential for reputational damage exceeding financial costs.


Expert Solution
Questions # 29:

Identify the network security incident where intended or authorized users are prevented from using system, network, or applications by flooding the network with a

high volume of traffic that consumes all existing network resources.

Options:

A.

XSS attack


B.

Denial-of-service


C.

URL manipulation


D.

SQL injection


Expert Solution
Questions # 30:

OmegaTech was compromised by an insider who deliberately introduced vulnerabilities into its flagship product after being recruited by a rival company. OmegaTech wants to minimize such risks in the future. What should be its primary focus?

Options:

A.

Rotate job roles every six months.


B.

Introduce surprise loyalty tests.


C.

Implement a strict vetting process for every software release.


D.

Strengthen background checks and continually monitor employee behavior for anomalies.


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions