Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

AlphaTech, a cloud-based storage company, recently suffered data leakage. Investigation revealed an employee sent sensitive client data to a personal email. AlphaTech wants to implement a solution to monitor and prevent such incidents. What should they prioritize?

Options:

A.

Mandate employees to attend cyber hygiene workshops every month.


B.

Implement a Data Loss Prevention (DLP) tool to monitor sensitive data movement.


C.

Limit email attachments to SMB for all employees.


D.

Block all personal email domains on the company network.


Expert Solution
Questions # 62:

WebDynamics experienced altered webpage content due to stored Cross-Site Scripting (XSS) attacks caused by lack of output encoding. What should be the main focus to prevent this?

Options:

A.

Implement proper output encoding for displayed content.


B.

Establish a Web Application Firewall (WAF).


C.

Regularly update the CMS and plugins.


D.

Introduce mandatory two-factor authentication.


Expert Solution
Questions # 63:

After a recent email attack, Harry is analyzing the incident to obtain important information related to the incident. While investigating the incident, he is trying to

extract information such as sender identity, mail server, sender’s IP address, location, and so on.

Which of the following tools Harry must use to perform this task?

Options:

A.

Clamwin


B.

Logly


C.

Yesware


D.

Sharp


Expert Solution
Questions # 64:

ClobalTech, an avant-garde tech giant, became victim to a massive data breach. The perpetrator was identified as an inside employee who had been with the company for over a decade. The breach unveiled sensitive client data that severely tarnished the company's reputation. ClobalTech is now revamping its security strategy. What should be its primary emphasis?

Options:

A.

Monitor and restrict internet access for employees.


B.

Rotate employees between departments every year.


C.

Mandate monthly cybersecurity training for all employees.


D.

Implement behavioral analytics to scrutinize and detect abnormal employee activities.


Expert Solution
Questions # 65:

Which of the following information security personnel handles incidents from management and technical point of view?

Options:

A.

Network administrators


B.

Incident manager (IM)


C.

Threat researchers


D.

Forensic investigators


Expert Solution
Questions # 66:

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.

Cross-site scripting


B.

Insecure direct object references


C.

Cross-site request forgery


D.

SQL injection


Expert Solution
Questions # 67:

ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?

Options:

A.

Slowloris attack


B.

UDP flood attack


C.

SYN flood attack


D.

Ping of ceath


Expert Solution
Questions # 68:

In which of the following stages of incident handling and response (IH&R) process do

the incident handlers try to find out the root cause of the incident along with the threat

actors behind the incidents, threat vectors, etc.?

Options:

A.

Post-incident activities


B.

Incident triage


C.

Evidence gathering and forensics analysis


D.

Incident recording and assignment


Expert Solution
Questions # 69:

Rinni is an incident handler and she is performing memory dump analysis.

Which of following tools she can use in order to perform memory dump analysis?

Options:

A.

OllyDbg and IDA Pro


B.

Scylla and OllyDumpEx


C.

Procmon and ProcessExplorer


D.

iNetSim


Expert Solution
Questions # 70:

A large healthcare provider with an extensive network of endpoints experiences a significant ransomware attack encrypting critical patient data. What underscores the importance of an effective endpoint security incident handling and response framework in this context?

Options:

A.

The necessity of maintaining operational continuity in healthcare services to ensure patient care.


B.

The requirement to report the incident to regulatory bodies within a specified timeframe.


C.

The need to overhaul the entire IT infrastructure post-incident.


D.

The potential for reputational damage exceeding financial costs.


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions