Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

In which of the following types of fuzz testing strategies the new data will be generated

from scratch and the amount of data to be generated are predefined based on the

testing model?

Options:

A.

Log-based fuzz testing


B.

Generation-based fuzz testing


C.

Mutation-based fuzz testing


D.

Protocol-based fuzz testing


Expert Solution
Questions # 52:

FinTechHub, a financial tech startup, experienced a Cross-Site Scripting (XSS) attack on their main application. Post the incident the team is keen on implementing proactive measures to handle such vulnerabilities. What should be their primary focus to prevent future XSS attacks?

Options:

A.

Deploy a network-based intrusion detection system (IDS).


B.

Sanitize and validate all user inputs across the application.


C.

Regularly patch and update the server operating system.


D.

Implement rate limiting on the application.


Expert Solution
Questions # 53:

After a web application attack, HealthFirst traced the breach to an insecure Direct Object Reference (IDOR) vulnerability. They want to patch it and fortify the app. What should be their primary action?

Options:

A.

Introduce a WAF with default rules.


B.

Conduct regular penetration testing on the application.


C.

Implement role-based access controls (RBAC) for data access.


D.

Encrypt all data at rest and in transit.


Expert Solution
Questions # 54:

Identify Sarbanes–Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of

securities analysts.

Options:

A.

Title VIII: Corporate and Criminal Fraud Accountability


B.

Title V: Analyst Conflicts of Interest


C.

Title VII: Studies and Reports


D.

Title IX: White-Collar-Crime Penalty Enhancement


Expert Solution
Questions # 55:

Which of the following risk mitigation strategies involves execution of controls to

reduce the risk factor and brings it to an acceptable level or accepts the potential risk

and continues operating the IT system?

Options:

A.

Risk assumption


B.

Risk avoidance


C.

Risk planning


D.

Risk transference


Expert Solution
Questions # 56:

An organization named Sam Morison Inc. decided to use cloud-based services to reduce

the cost of maintenance. The organization identified various risks and threats

associated with cloud service adoption and migrating business-critical data to thirdparty systems. Hence, the organization decided to deploy cloud-based security tools to

prevent upcoming threats.

Which of the following tools help the organization to secure the cloud resources and

services?

Options:

A.

Nmap


B.

Burp Suite


C.

Wireshark


D.

Alert Logic


Expert Solution
Questions # 57:

SevTech detected malicious code injected into its client data protection module, with indicators of a nation-state actor. In this high-pressure scenario, what should be SevTech's primary course of action?

Options:

A.

Coordinate discreetly with governmental cyber units to gather intelligence.


B.

Notify all clients and suggest immediate disconnection.


C.

Immediately patch the discovered vulnerability and roll out updates without informing clients.


D.

Execute a counter-hack to identify the attacker.


Expert Solution
Questions # 58:

Malicious Micky has moved from the delivery stage to the exploitation stage of the kill chain. This malware wants to find and report to the command center any useful services on the system. Which of the following recon attacks is the MOST LIKELY to provide this information?

Options:

A.

IP range sweep


B.

Packet sniffing


C.

Session hijack


D.

Port scan


Expert Solution
Questions # 59:

Liam, a network engineer, configures firewalls to prevent outbound file transfers over unauthorized FTP and HTTP channels. Despite this, an insider used encrypted traffic via HTTPS to exfiltrate data. A review revealed that no deep packet inspection was in place. Which insider threat eradication control could have helped prevent this?

Options:

A.

Mandatory biometric authentication


B.

Implementing data loss prevention (DLP) tools


C.

Enforcing secure coding practices


D.

Using USB blocking software


Expert Solution
Questions # 60:

Following a security alert, the incident response team at a legal consulting firm suspects that an employee used a USB storage device to exfiltrate confidential client data. To confirm which USB device was connected and gather timestamps and identifiers, which method is most effective?

Options:

A.

Check Windows registry entries under Enum\USB.


B.

Scan network logs for USB file upload patterns.


C.

Review Windows SetupAPI.dev.log file entries.


D.

Use WHOIS lookup to trace USB activity.


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions