Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Ross is an incident manager (IM) at an organization, and his team provides support to all users in the organization who are affected by threats or attacks. David, who is the organization's internal auditor, is also part of Ross's incident response team. Which of the following is David's responsibility?

Options:

A.

Configure information security controls.


B.

Identify and report security loopholes to the management for necessary action.


C.

Coordinate incident containment activities with the information security officer (ISO).


D.

Perform the- necessary action to block the network traffic from the suspectoc intruder.


Expert Solution
Questions # 42:

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

Options:

A.

Cache


B.

Disk


C.

Emails


D.

Temp files


Expert Solution
Questions # 43:

Which of the following terms refers to vulnerable account management functions, including account update, recovery of forgotten or lost passwords, and password reset, that might weaken valid authentication schemes?

Options:

A.

SQL injection


B.

Broken account management


C.

Directory traversal


D.

Cross-site scripting


Expert Solution
Questions # 44:

Which of the following types of digital evidence is temporarily stored in a digital device that requires constant power supply and is deleted if the power supply is interrupted?

Options:

A.

Slack space


B.

Process memory


C.

Event logs


D.

Swap file


Expert Solution
Questions # 45:

Which of the following methods help incident responders to reduce the false-positive

alert rates and further provide benefits of focusing on topmost priority issues reducing

potential risk and corporate liabilities?

Options:

A.

Threat profiling


B.

Threat contextualization


C.

Threat correlation


D.

Threat attribution


Expert Solution
Questions # 46:

Which of the following tools helps incident handlers to view the file system, retrieve deleted data, perform timeline analysis, web artifacts, etc., during an incident response process?

Options:

A.

Autopsy


B.

netstat


C.

Process Explorer


D.

nblslal


Expert Solution
Questions # 47:

Which of the following email security tools can be used by an incident handler to

prevent the organization against evolving email threats?

Options:

A.

Email Header Analyzer


B.

G Suite Toolbox


C.

MxToolbox


D.

Gpg4win


Expert Solution
Questions # 48:

A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?

Options:

A.

On-prom installation


B.

saaS


C.

laaS


D.

PaaS


Expert Solution
Questions # 49:

Francis is an incident handler and security expert. He works at MorisonTech Solutions based in Sydney, Australia. He was assigned a task to detect phishing/spam mails for the client organization.

Which of the following tools can assist Francis to perform the required task?

Options:

A.

Netcraft


B.

Nessus


C.

BTCrack


D.

Cain and Abel


Expert Solution
Questions # 50:

Which of the following are malicious software programs that infect computers and corrupt or delete the data on them?

Options:

A.

Worms


B.

Trojans


C.

Spyware


D.

Virus


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions