Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following is a common tool used to help detect malicious internal or compromised actors?

Options:

A.

User behavior analytics


B.

SOC2 compliance report


C.

Log forward ng


D.

Syslog configuration


Expert Solution
Questions # 42:

A ransomware attack recently disrupted operations at a manufacturing facility, specifically targeting its IoT-integrated conveyor system. While attempting to recover from the incident, the incident response team discovered that the available backups were incomplete—several critical sensor logs and control commands were missing, which caused delays in restoring device functions and syncing with other systems. The team concludes that relying on traditional backup routines alone is insufficient for restoring full IoT functionality after an attack. Which strategy would best prevent such issues in future recovery efforts?

Options:

A.

Use long-term tape archival for all IoT firmware images.


B.

Store historical sensor logs in compressed ZIP archives on shared drives.


C.

Schedule periodic external hard drive backups for operator terminals.


D.

Maintain synchronized cloud replicas of critical IoT resources.


Expert Solution
Questions # 43:

Sophia, an incident handler at a cloud hosting provider, is investigating reports of intermittent web server slowdowns and timeouts. Upon analyzing router logs, she finds an unusually high number of incomplete connection attempts, causing the server’s memory and CPU resources to spike. Suspecting a form of resource exhaustion attack, she applies a protective configuration to the router that allows it to validate connection requests before they reach the server. Soon after this change, the number of partial connections decreases, and the server regains stable performance. What was the purpose of this action?

Options:

A.

To scan for malicious payloads


B.

To prevent brute-force logins


C.

To block SYN flood attempts


D.

To monitor port scans


Expert Solution
Questions # 44:

WebDynamics experienced altered webpage content due to stored Cross-Site Scripting (XSS) attacks caused by lack of output encoding. What should be the main focus to prevent this?

Options:

A.

Implement proper output encoding for displayed content.


B.

Establish a Web Application Firewall (WAF).


C.

Regularly update the CMS and plugins.


D.

Introduce mandatory two-factor authentication.


Expert Solution
Questions # 45:

After experiencing a large-scale distributed denial-of-service (DDoS) attack that caused service outages, a national telecom provider recovered its web platform. The IH&R team must now implement post-recovery measures to enhance resilience against future DDoS attempts. Which action would be most effective?

Options:

A.

Remove antivirus to speed up application response


B.

Configure a CDN and implement blackhole routing


C.

Add guest user accounts for remote diagnostics


D.

Increase FTP access for easier maintenance


Expert Solution
Questions # 46:

Francis is an incident handler and security expert. He works at MorisonTech Solutions based in Sydney, Australia. He was assigned a task to detect phishing/spam mails for the client organization.

Which of the following tools can assist Francis to perform the required task?

Options:

A.

Netcraft


B.

Nessus


C.

BTCrack


D.

Cain and Abel


Expert Solution
Questions # 47:

ThetaTec, a global fintech giant, identified that an employee was siphoning off funds using a sophisticated method undetectable by traditional monitoring tools. The firm decided to employ advanced techniques to detect such hidden insider threats. What should be its primary focus?

Options:

A.

Install hidden microphones in the office to capture conversations.


B.

Use behavioral analytics to identify potential risks based on employee actions and patterns.


C.

Mandate all employees to provide access to their personal bank statements.


D.

Conduct polygraph tests on all employees quarterly.


Expert Solution
Questions # 48:

Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high-profile executives of the company. What type of phishing attack is this?

Options:

A.

Pharming


B.

Whaling


C.

Puddle phishing


D.

Spear phishing


Expert Solution
Questions # 49:

Which of the following tools helps incident handlers to view the file system, retrieve deleted data, perform timeline analysis, web artifacts, etc., during an incident response process?

Options:

A.

Autopsy


B.

netstat


C.

Process Explorer


D.

nblslal


Expert Solution
Questions # 50:

Following a spear-phishing campaign targeting executive-level employees, a mid-sized financial firm experienced unauthorized access to internal systems, leading to widespread disruption of customer-facing applications. Although the technical issues were resolved within days, the breach triggered legal scrutiny and negative press coverage. Several major customers expressed concern about the firm's risk posture and began transitioning to competitors. Investor confidence was impacted as the stock value dipped, and senior leadership initiated a damage control campaign. Which of the following best categorizes the broader consequences experienced by the organization?

Options:

A.

Tangible operational costs including the deployment of response infrastructure.


B.

Recovery complications caused by delayed asset inventory synchronization.


C.

Intangible business effects involving stakeholder defection and public image decline.


D.

Measurable loss from hardware failure and direct asset compromise.


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions