Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Andrew, an incident responder, is performing risk assessment of the client organization.

As a part of risk assessment process, he identified the boundaries of the IT systems,

along with the resources and the information that constitute the systems.

Identify the risk assessment step Andrew is performing.

Options:

A.

Control analysis


B.

System characterization


C.

Likelihood determination


D.

Control recommendations


Expert Solution
Questions # 32:

Which of the following is a common tool used to help detect malicious internal or compromised actors?

Options:

A.

User behavior analytics


B.

SOC2 compliance report


C.

Log forward ng


D.

Syslog configuration


Expert Solution
Questions # 33:

Patrick is doing a cyber forensic investigation. He is in the process of collecting physical

evidence at the crime scene.

Which of the following elements he must consider while collecting physical evidence?

Options:

A.

Open ports, services, and operating system (OS) vulnerabilities


B.

DNS information including domain and subdomains


C.

Published name servers and web application source code


D.

Removable media, cable, and publications


Expert Solution
Questions # 34:

Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?

Options:

A.

Vulnerability identification


B.

Impact analysis


C.

Likelihood analysis


D.

System characterization


Expert Solution
Questions # 35:

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.

Options:

A.

3-->6-->1-->2-->5-->4-->7


B.

1-->3-->2-->4-->5-->6-->7


C.

4-->1-->2-->3-->6-->5-->7


D.

2-->1-->4-->7-->5-->6-->3


Expert Solution
Questions # 36:

Eric works as an incident handler at Erinol software systems. He was assigned a task to protect the organization from any kind of DoS/DDoS attacks.

Which of the following tools can be used by Eric to achieve his objective?

Options:

A.

Incapsula


B.

Hydra


C.

IDA


D.

Wireshark


Expert Solution
Questions # 37:

Clark is investigating a cybercrime at TechSoft Solutions. While investigating the case,

he needs to collect volatile information such as running services, their process IDs,

startmode, state, and status.

Which of the following commands will help Clark to collect such information from

running services?

Options:

A.

Openfiles


B.

netstat –ab


C.

wmic


D.

net file


Expert Solution
Questions # 38:

Which of the following details are included in the evidence bags?

Options:

A.

Error messages that contain sensitive information and files containing passworos


B.

Software version information and web application source code


C.

Sensitive cirectories, personal, and organizational email adcress


D.

Date and time of seizure, exhibit number, anc name of incident responder


Expert Solution
Questions # 39:

John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique. Identify the type of attack John is performing on the target organization.

Options:

A.

War driving


B.

Pharming


C.

Skimming


D.

Pretexting


Expert Solution
Questions # 40:

An attacker traced out and found the kind of websites a target company/individual is

frequently surfing and tested those particular websites to identify any possible

vulnerabilities. When the attacker detected vulnerabilities in the website, the attacker

started injecting malicious script/code into the web application that can redirect the

webpage and download the malware onto the victim’s machine. After infecting the

vulnerable web application, the attacker waited for the victim to access the infected web

application.

Identify the type of attack performed by the attacker.

Options:

A.

Watering hole


B.

Obfuscation application


C.

Directory traversal


D.

Cookie/Session poisoning


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions