Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?

Options:

A.

Anti-forensics


B.

Adversarial mechanics


C.

Felony


D.

Legal hostility


Expert Solution
Questions # 32:

Eric who is an incident responder is working on developing incident-handling plans and

procedures. As part of this process, he is performing analysis on the organizational

network to generate a report and to develop policies based on the acquired results.

Which of the following tools will help him in analyzing network and its related traffic?

Options:

A.

FaceNiff


B.

Wireshark


C.

Burp Suite


D.

Whois


Expert Solution
Questions # 33:

After a recent cloud migration, AeroFlights, an airline company, spotted unauthorized data access. Preliminary checks hinted at malware that used cloud resources to spread, impacting flight schedules. Equipped with a cloud-specific security tool and a real-time scheduling monitor, what should be the primary action?

Options:

A.

Temporarily halt all flight operations until the issue is resolved.


B.

Deploy the cloud security tool to identify and counteract the malware.


C.

Notify passengers about possible delays and offer compensation.


D.

Monitor flight schedules in real-time to avoid potential disruptions.


Expert Solution
Questions # 34:

Which of the following best describes an email issued as an attack medium, in which several messages are sent to a mailbox to cause overflow?

Options:

A.

Email-bombing


B.

Masquerading


C.

Spoofing


D.

Smurf attack


Expert Solution
Questions # 35:

Employee monitoring tools are mostly used by employers to find which of the following?

Options:

A.

Lost registry keys


B.

Conspiracies


C.

Malicious insider threats


D.

Stolen credentials


Expert Solution
Questions # 36:

Dash wants to perform a DoS attack over 256 target URLs simultaneously.

Which of the following tools can Dash employ to achieve his objective?

Options:

A.

HOIC


B.

IDAPro


C.

Ollydbg


D.

OpenVAS


Expert Solution
Questions # 37:

Michael is a part of the computer incident response team of a company. One of his responsibilities is to handle email incidents. The company receives an email from an unknown source, and one of the steps that he needs to take is to check the validity of the email. Which of the following tools should he use?

Options:

A.

Zendio


B.

Email Dossier


C.

Yesware


D.

G Suite Toolbox


Expert Solution
Questions # 38:

Clark is investigating a cybercrime at TechSoft Solutions. While investigating the case,

he needs to collect volatile information such as running services, their process IDs,

startmode, state, and status.

Which of the following commands will help Clark to collect such information from

running services?

Options:

A.

Openfiles


B.

netstat –ab


C.

wmic


D.

net file


Expert Solution
Questions # 39:

An Azure administrator discovers unauthorized access to a storage account containing sensitive documents. The initial investigation suggests compromised credentials. In response to this incident, what should be the administrator's first action to secure the account?

Options:

A.

Move sensitive documents to a new storage account with restricted access.


B.

Reset the credentials of the compromised account and review all recent access logs.


C.

Contact Azure support for an immediate investigation and assistance.


D.

Enable Azure Multi-Factor Authentication (MFA) for all user accounts accessing the storage.


Expert Solution
Questions # 40:

Nina, an experienced network incident responder working for a financial services firm, receives a series of high-priority alerts from Splunk Enterprise Security. The alerts are triggered by anomalous HTTP traffic patterns coming from a workstation within the internal network. Specifically, the system flagged repeated attempts to access untrusted external URLs, followed by the download of executable (.exe) files during non-business hours. Suspecting malicious activity, Nina begins investigating the web proxy logs and correlates them with endpoint detection logs. Her analysis confirms that the downloaded executables were not digitally signed and were flagged as malware by the organization's endpoint protection system shortly after execution. She also finds evidence that the malware attempted to establish outbound communication, likely for command-and-control (C2) purposes.

Nina immediately initiates containment by isolating the affected endpoint from the network. She proceeds to perform a wider investigation using system-wide and firewall logs to assess if the malware spread laterally or exfiltrated any sensitive data. What is the most likely cause of this incident?

Options:

A.

Inappropriate resource usage through malicious downloads


B.

Wi-Fi spoofing from a rogue device


C.

Malware injected through a SQL vulnerability


D.

Unauthorized privilege escalation attempt


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions