Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

QualTech Solutions is a leading security services enterprise. Dickson, who works as an incident responder with this firm, is performing a vulnerability assessment to identify the security problems in the network by using automated tools for identifying the hosts, services, and vulnerabilities in the enterprise network. In the above scenario, which of the following types of vulnerability assessment is Dickson performing?

Options:

A.

Active assessment


B.

External assessment


C.

Internal assessment


D.

Passive assessment


Expert Solution
Questions # 62:

Which of the following is NOT part of the static data collection process?

Options:

A.

Evidence oxa mi nation


B.

System preservation


C.

Password protection


D.

Evidence acquisition


Expert Solution
Questions # 63:

An AWS user notices unusual activity in their EC2 instances, including unexpected outbound traffic. When suspecting a security compromise, what is the most effective immediate step to take to contain the incident?

Options:

A.

Increase logging levels and monitor traffic for anomalies.


B.

Terminate all affected EC2 instances.


C.

Reboot the affected instances to disrupt unauthorized processes.


D.

Snapshot the affected instances for forensic analysis and then isolate them using network ACLs.


Expert Solution
Questions # 64:

Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To acccomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources (processor cache) to steal data (cryptographic key/plain text secrets) from the victim machine. Identify the type of attack Alice is performing in the above scenario.

Options:

A.

Side channel attack


B.

Service hijacking


C.

SQL injection attack


D.

Man-in-the-cloud attack


Expert Solution
Questions # 65:

An attacker traced out and found the kind of websites a target company/individual is

frequently surfing and tested those particular websites to identify any possible

vulnerabilities. When the attacker detected vulnerabilities in the website, the attacker

started injecting malicious script/code into the web application that can redirect the

webpage and download the malware onto the victim’s machine. After infecting the

vulnerable web application, the attacker waited for the victim to access the infected web

application.

Identify the type of attack performed by the attacker.

Options:

A.

Watering hole


B.

Obfuscation application


C.

Directory traversal


D.

Cookie/Session poisoning


Expert Solution
Questions # 66:

James has been appointed as an incident handling and response (IH&R) team lead and

he was assigned to build an IH&R plan along with his own team in the company.

Identify the IH&R process step James is currently working on.

Options:

A.

Eradication


B.

Recovery


C.

Preparation


D.

Notification


Expert Solution
Questions # 67:

Lara, a SOC analyst, investigates multiple alerts generated by an IDS showing repeated login failures from a specific workstation to an internal application. When reviewing Windows Event Viewer logs, she discovers a user repeatedly attempting logins outside of working hours. Further checks reveal the user had installed an unauthorized remote desktop tool. Which of the following best describes this situation?

Options:

A.

Policy-enforced remote work attempt


B.

Unauthorized access incident from a third party


C.

Inappropriate usage due to policy violation and software installation


D.

DoS attack against an internal application


Expert Solution
Questions # 68:

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

Options:

A.

Cache


B.

Disk


C.

Emails


D.

Temp files


Expert Solution
Questions # 69:

Aarav, an IT support specialist, identifies that multiple employees have engaged with an email promoting free shopping vouchers, which appears suspicious. To minimize the potential threat, he instructs staff to report the message, classify it as junk, and remove it from their inboxes. He further advises them not to interact with similar messages in the future, even if they seem to come from internal contacts. Which best practice is Aarav reinforcing?

Options:

A.

Sort emails by priority


B.

Digitally sign email attachments


C.

Disable preview pane in the inbox


D.

Avoid replying to or forwarding suspicious emails


Expert Solution
Questions # 70:

Racheal is an incident handler working in InceptionTech organization. Recently,

numerous employees are complaining about receiving emails from unknown senders. In

order to prevent employees against spoofing emails and keeping security in mind,

Racheal was asked to take appropriate actions in this matter. As a part of her

assignment, she needs to analyze the email headers to check the authenticity of received

emails.

Which of the following protocol/authentication standards she must check in email

header to analyze the email authenticity?

Options:

A.

DKIM


B.

SNMP


C.

POP


D.

ARP


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions