Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following information security personnel handles incidents from management and technical point of view?

Options:

A.

Network administrators


B.

Incident manager (IM)


C.

Threat researchers


D.

Forensic investigators


Expert Solution
Questions # 22:

A malicious, security-breaking program is disguised as a useful program. Such executable programs, which are installed when a file is opened, allow others to control a user's system. What is this type of program called?

Options:

A.

Trojan


B.

Worm


C.

Virus


D.

Spyware


Expert Solution
Questions # 23:

An attack on a network is BEST blocked using which of the following?

Options:

A.

IPS device inline


B.

HIPS


C.

Web proxy


D.

Load balancer


Expert Solution
Questions # 24:

Stanley works as an incident responder at a top MNC based out of Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company.

While investigating the crime, he collected the evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of

jury so that the evidence explains the facts clearly and further helps in obtaining an expert opinion on the same to confirm the investigation process.

In the above scenario, what is the characteristic of the digital evidence Stanley tried to preserve?

Options:

A.

Believable


B.

Complete


C.

Authentic


D.

Admissible


Expert Solution
Questions # 25:

Which of the following is NOT part of the static data collection process?

Options:

A.

Evidence oxa mi nation


B.

System preservation


C.

Password protection


D.

Evidence acquisition


Expert Solution
Questions # 26:

Attackers or insiders create a backdoor into a trusted network by installing an unsecured access point inside a firewall. They then use any software or hardware access point to perform an attack. Which of the following is this type of attack?

Options:

A.

Rogue- access point attack


B.

Password-based attack


C.

Malware attack


D.

Email infection


Expert Solution
Questions # 27:

Stanley works as an incident responder at a top MNC based in Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company. While investigating the incident, he collected evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of a jury so that the evidence clarifies the facts and further helps in obtaining an expert opinion on the incident to confirm the investigation process. In the above scenario, which of the following characteristics of the digital evidence did Stanley attempt to preserve?

Options:

A.

Completeness


B.

Admissibility


C.

Believability


D.

Authenticity


Expert Solution
Questions # 28:

In which of the following phases of the incident handling and response (IH&R) process is the identified security incidents analyzed, validated, categorized, and prioritized?

Options:

A.

Incident triage


B.

Incident recording and assignment


C.

Containment


D.

Notification


Expert Solution
Questions # 29:

Francis received a spoof email asking for his bank information. He decided to use a tool to analyze the email headers. Which of the following should he use?

Options:

A.

EventLog Analyzer


B.

MxTooIbox


C.

Email Checker


D.

PoliteMail


Expert Solution
Questions # 30:

A US Federal Agency network was the target of a DoS attack that prevented and

impaired the normal authorized functionality of the networks. According to agency’s

reporting timeframe guidelines, this incident should be reported within 2 h of

discovery/detection if the successful attack is still ongoing and the agency is unable to

successfully mitigate the activity.

Which incident category of US Federal Agency does this incident belong to?

Options:

A.

CAT 6


B.

CAT 2


C.

CAT 1


D.

CAT 5


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions