Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECIH 212-89 Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Tara, a certified first responder in a digital forensics team, is dispatched to investigate a suspected insider attack targeting a critical workstation in the finance department. Upon arriving at the scene, she takes a methodical approach: she begins labeling all connected network cables, photographs the back panel of the workstation, documents cable connections, and records the power status of each connected device, including peripherals like external drives and monitors. She also notes the orientation and placement of equipment on the desk and the surrounding environment.

These actions are part of her protocol to ensure that, if the devices need to be moved for forensic analysis, investigators can accurately replicate the system’s physical setup at the time of the incident. What is Tara aiming to achieve with these actions?

Options:

A.

Create a physical reconstruction reference


B.

Maintain the continuity of system uptime


C.

Capture device logs in real-time


D.

Execute evidence integrity hashing


Expert Solution
Questions # 82:

Which of the following has been used to evade IDS and IPS?

Options:

A.

Fragmentation


B.

TNP


C.

HTTP


D.

SNMP


Expert Solution
Questions # 83:

Which of the following processes is referred to as an approach to respond to the

security incidents that occurred in an organization and enables the response team by

ensuring that they know exactly what process to follow in case of security incidents?

Options:

A.

Risk assessment


B.

Incident response orchestration


C.

Vulnerability management


D.

Threat assessment


Expert Solution
Questions # 84:

Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used for further investigation of the incident. In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?

Options:

A.

Containment


B.

Incident recording


C.

Incident triage


D.

Eradication


Expert Solution
Questions # 85:

Lena, a SOC analyst, observes a pattern of unusual login attempts originating from multiple foreign IP addresses tied to shared drive links circulating within the organization. These links were embedded in emails appearing to come from the HR department and marked with urgent subject lines. Upon deeper inspection, Lena finds multiple similar messages still pending in the mail server’s delivery queue. To prevent widespread exposure, she takes immediate action to eliminate these messages before they reach employees' inboxes. Which incident response action best describes Lena’s action?

Options:

A.

Preemptively purging queued phishing emails from the server


B.

Flagging login anomalies for correlation in the SIEM


C.

Initiating forensic triage on suspicious attachments


D.

Isolating compromised mailboxes from the email relay


Expert Solution
Questions # 86:

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

Options:

A.

Risk assessment


B.

Risk assumption


C.

Risk mitigation


D.

Risk avoidance


Expert Solution
Questions # 87:

SafePay, an online payment portal, recently introduced an advanced search feature. A week later, users reported unauthorized transactions. Investigation showed attackers exploited advanced search strings and a previously unidentified vulnerability. What is SafePay's best immediate action?

Options:

A.

Implement multi-factor authentication for all user accounts.


B.

Disable the advanced search feature and revert to the older version.


C.

Require users to re-authenticate before accessing advanced search.


D.

Increase the encryption level of stored user data.


Expert Solution
Questions # 88:

Which of the following terms refers to vulnerable account management functions, including account update, recovery of forgotten or lost passwords, and password reset, that might weaken valid authentication schemes?

Options:

A.

SQL injection


B.

Broken account management


C.

Directory traversal


D.

Cross-site scripting


Expert Solution
Questions # 89:

A logistics company relying heavily on cloud-based inventory management discovered unauthorized activity initiated by a third-party contractor. The investigation revealed that the contractor's login was reused across multiple departments and lacked any tracking mechanism or role-specific restrictions to limit its scope. What cloud security best practice should be implemented to prevent such violations?

Options:

A.

Enforcement of strict user access control and credential isolation


B.

Use of anonymized data during inventory analytics


C.

Routine vulnerability scans on mobile apps used by delivery teams


D.

Implementation of Secure Sockets Layer (SSL) encryption on internal systems


Expert Solution
Questions # 90:

Which of the following encoding techniques replaces unusual ASCII characters with

"%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

Options:

A.

URL encoding


B.

Unicode encoding


C.

Base64 encoding


D.

HTML encoding


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions