ECIH V2 Dumps
ECIH V2 Dumps
Get the Full 212-89 dumps in VCE and PDF From SurePassExam
https://www.surepassexam.com/212-89-exam-dumps.html (163 New Questions)
EC-Council
Exam Questions 212-89
EC Council Certified Incident Handler (ECIH v2)
NEW QUESTION 1
An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The
organization’s incident response manager, upon investigation, found that the incident must be handled within a few hours on the same day to maintain business
continuity and market competitiveness. How would you categorize such information security incident?
Answer: A
NEW QUESTION 2
Which of the following is an appropriate flow of the incident recovery steps?
Answer: D
NEW QUESTION 3
A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT
part of the computer risk policy?
Answer: C
NEW QUESTION 4
Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high
volume of traffic that consumes all existing network
resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection
D. Denial of Service Attack
Answer: D
NEW QUESTION 5
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and
extent of an incident?
A. Eradication
B. Containment
C. Identification
D. Data collection
Answer: B
NEW QUESTION 6
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system.
These programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a
stranger.
A. Cookie tracker
B. Worm
C. Trojan
D. Virus
Answer: C
NEW QUESTION 7
An incident recovery plan is a statement of actions that should be taken before, during or after an incident. Identify which of the following is NOT an objective of the
incident recovery plan?
Answer: A
NEW QUESTION 8
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital
media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer
forensics process:
Answer: D
NEW QUESTION 9
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 10
Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will
maintain the information assurance (IA) and security posture of a system or site.
A. NIASAP
B. NIAAAP
C. NIPACP
D. NIACAP
Answer: D
NEW QUESTION 10
Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies
authorizes a group of users to perform a set of actions on a set of resources?
Answer: A
NEW QUESTION 13
In the Control Analysis stage of the NIST’s risk assessment methodology, technical and none technical control methods are classified into two categories. What
are these two control categories?
Answer: A
NEW QUESTION 17
An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves
auditing the system and network log files?
A. Incident recording
B. Reporting
C. Containment
D. Identification
Answer: D
NEW QUESTION 19
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According
to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process
improvement mechanisms?
A. Protection
B. Preparation
C. Detection
D. Triage
Answer: A
NEW QUESTION 21
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance,
tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer: A
NEW QUESTION 24
The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:
A. If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.
B. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.
C. If the insider’s technical literacy is high and process knowledge is low, the risk posed by the threat will be high.
D. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be high.
Answer: D
NEW QUESTION 25
Which policy recommends controls for securing and tracking organizational resources:
Answer: D
NEW QUESTION 28
Organizations or incident response teams need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally
attacked the computer system. EVIDENCE PROTECTION is also required to meet legal compliance issues. Which of the following documents helps in protecting
evidence from physical or logical damage:
Answer: B
NEW QUESTION 30
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 33
A security policy will take the form of a document or a collection of documents, depending on the situation or usage. It can become a point of reference in case a
violation occurs that results in dismissal or other penalty. Which of the following is NOT true for a good security policy?
A. It must be enforceable with security tools where appropriate and with sanctions where actual prevention is not technically feasible
B. It must be approved by court of law after verifications of the stated terms and facts
C. It must be implemented through system administration procedures, publishing of acceptable use guide lines or other appropriate methods
D. It must clearly define the areas of responsibilities of the users, administrators and management
Answer: B
NEW QUESTION 37
An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular
job role requires the use of those resources. Which of the following is NOT a fundamental element of access control policy
Answer: B
NEW QUESTION 42
Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The
personal computer of the criminal in question was confiscated by the county police. Which of the following evidence will lead John in his investigation?
A. SAM file
B. Web serve log
C. Routing table list
D. Web browser history
Answer: D
NEW QUESTION 45
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 48
Which of the following incidents are reported under CAT -5 federal agency category?
Answer: C
NEW QUESTION 53
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy
that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
A. Risk Assumption
B. Research and acknowledgment
C. Risk limitation
D. Risk absorption
Answer: B
NEW QUESTION 57
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: B
NEW QUESTION 62
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 65
Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?
Answer: B
NEW QUESTION 70
What is correct about Quantitative Risk Analysis:
Answer: B
NEW QUESTION 72
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 74
Incident response team must adhere to the following:
Answer: D
NEW QUESTION 79
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 80
The region where the CSIRT is bound to serve and what does it and give service to is known as:
A. Consistency
B. Confidentiality
C. Constituency
D. None of the above
Answer: C
NEW QUESTION 81
The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
NEW QUESTION 85
Changing the web server contents, Accessing the workstation using a false ID and Copying sensitive data without authorization are examples of:
A. DDoS attacks
B. Unauthorized access attacks
C. Malware attacks
D. Social Engineering attacks
Answer: B
NEW QUESTION 86
The very well-known free open source port, OS and service scanner and network discovery utility is called:
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
NEW QUESTION 91
In a DDoS attack, attackers first infect multiple systems, which are then used to attack a particular target directly. Those systems are called:
A. Honey Pots
B. Relays
C. Zombies
D. Handlers
Answer: C
NEW QUESTION 95
A Malicious code attack using emails is considered as:
Answer: D
NEW QUESTION 98
They type of attack that prevents the authorized users to access networks, systems, or applications by exhausting the network resources and sending illegal
requests to an application is known as:
Answer: B
A. Spyware
B. adware
C. Virus
D. Malware
Answer: A
A. Gathering information
B. Displaying popups
C. Intimidating users
D. Replicating
Answer: B
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: B
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
Answer: A
Answer: B
Answer: B
A. Outsider threats
B. Social Engineers
C. Insider threats
D. Zombies
Answer: C
Answer: B
Answer: A
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Answer: B
A. Ignorant employees
B. Carless administrators
C. Disgruntled staff members
D. All the above
Answer: D
Answer: B
A. “dd” command
B. “netstat” command
C. “nslookup” command
D. “find” command
Answer: A
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: A
A. Digital evidence
B. Computer Emails
C. Digital investigation
D. Digital Forensic Examiner
Answer: A
Answer: A
Answer: D
A. Phone call
B. Facsimile (Fax)
C. Email or on-line Web form
D. All the above
Answer: D
Answer: C
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
Answer: C
Answer: B
Answer: D
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Answer: A
Answer: D
A. Constitutional/ Legitimate
B. Illegal/ illegitimate
C. Unethical
D. None of the above
Answer: A
Answer: B
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
212-89 Dumps
https://www.certleader.com/212-89-dumps.html
NEW QUESTION 1
Which of the following is an appropriate flow of the incident recovery steps?
Answer: D
NEW QUESTION 2
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 3
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 4
Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is
responsible for examining the evidence acquired and separating the useful evidence?
A. Evidence Supervisor
B. Evidence Documenter
C. Evidence Manager
D. Evidence Examiner/ Investigator
Answer: D
NEW QUESTION 5
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Answer: A
NEW QUESTION 6
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 7
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific
requirements that the planning should address. There are five major components of the IT contingency plan, namely supporting information, notification activation,
recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution plan?
A. To restore the original site, tests systems to prevent the incident and terminates operations
B. To define the notification procedures, damage assessments and offers the plan activation
C. To provide the introduction and detailed concept of the contingency plan
D. To provide a sequence of recovery activities with the help of recovery procedures
Answer: A
NEW QUESTION 8
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 9
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 10
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it
to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
Answer: A
NEW QUESTION 10
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 15
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the
infected hosts from the information system?
Answer: B
NEW QUESTION 18
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 21
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy
that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
A. Risk Assumption
B. Research and acknowledgment
C. Risk limitation
D. Risk absorption
Answer: B
NEW QUESTION 23
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 26
An assault on system security that is derived from an intelligent threat is called:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
Answer: C
NEW QUESTION 28
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 29
Incident prioritization must be based on:
A. Potential impact
B. Current damage
C. Criticality of affected systems
D. All the above
Answer: D
NEW QUESTION 34
Which of the following can be considered synonymous:
Answer: A
NEW QUESTION 36
If the loss anticipated is greater than the agreed upon threshold; the organization will:
Answer: B
NEW QUESTION 38
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 39
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 43
Incident Response Plan requires
Answer: D
NEW QUESTION 45
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
NEW QUESTION 49
The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
NEW QUESTION 54
The very well-known free open source port, OS and service scanner and network discovery utility is called:
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
NEW QUESTION 59
A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control
the victim’s system is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
NEW QUESTION 60
The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Answer: C
NEW QUESTION 65
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs
is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
NEW QUESTION 69
The main difference between viruses and worms is:
Answer: B
NEW QUESTION 72
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could be:
Answer: D
NEW QUESTION 76
Spyware tool used to record malicious user’s computer activities and keyboard stokes is called:
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Answer: B
NEW QUESTION 77
Which of the following may be considered as insider threat(s):
Answer: B
NEW QUESTION 79
Which of the following is NOT a digital forensic analysis tool:
Answer: B
NEW QUESTION 80
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the
established connections on it:
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
NEW QUESTION 84
Digital evidence must:
Answer: A
NEW QUESTION 85
The process of rebuilding and restoring the computer systems affected by an incident to normal operational stage including all the processes, policies and tools is
known as:
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
NEW QUESTION 90
Business Continuity planning includes other plans such as:
Answer: D
NEW QUESTION 92
The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use
of fault tolerant systems, as well as a solid backup and recovery strategy is known as:
Answer: B
NEW QUESTION 97
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
Answer: D
Answer: B
100% Pass Your 212-89 Exam with Our Prep Materials Via below:
https://www.certleader.com/212-89-dumps.html
212-89 Dumps
https://www.certleader.com/212-89-dumps.html
NEW QUESTION 1
Which of the following is an appropriate flow of the incident recovery steps?
Answer: D
NEW QUESTION 2
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 3
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 4
Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is
responsible for examining the evidence acquired and separating the useful evidence?
A. Evidence Supervisor
B. Evidence Documenter
C. Evidence Manager
D. Evidence Examiner/ Investigator
Answer: D
NEW QUESTION 5
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Answer: A
NEW QUESTION 6
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 7
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific
requirements that the planning should address. There are five major components of the IT contingency plan, namely supporting information, notification activation,
recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution plan?
A. To restore the original site, tests systems to prevent the incident and terminates operations
B. To define the notification procedures, damage assessments and offers the plan activation
C. To provide the introduction and detailed concept of the contingency plan
D. To provide a sequence of recovery activities with the help of recovery procedures
Answer: A
NEW QUESTION 8
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 9
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 10
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it
to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
Answer: A
NEW QUESTION 10
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 15
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the
infected hosts from the information system?
Answer: B
NEW QUESTION 18
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 21
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy
that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
A. Risk Assumption
B. Research and acknowledgment
C. Risk limitation
D. Risk absorption
Answer: B
NEW QUESTION 23
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 26
An assault on system security that is derived from an intelligent threat is called:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
Answer: C
NEW QUESTION 28
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 29
Incident prioritization must be based on:
A. Potential impact
B. Current damage
C. Criticality of affected systems
D. All the above
Answer: D
NEW QUESTION 34
Which of the following can be considered synonymous:
Answer: A
NEW QUESTION 36
If the loss anticipated is greater than the agreed upon threshold; the organization will:
Answer: B
NEW QUESTION 38
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 39
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 43
Incident Response Plan requires
Answer: D
NEW QUESTION 45
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
NEW QUESTION 49
The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
NEW QUESTION 54
The very well-known free open source port, OS and service scanner and network discovery utility is called:
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
NEW QUESTION 59
A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control
the victim’s system is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
NEW QUESTION 60
The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Answer: C
NEW QUESTION 65
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs
is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
NEW QUESTION 69
The main difference between viruses and worms is:
Answer: B
NEW QUESTION 72
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could be:
Answer: D
NEW QUESTION 76
Spyware tool used to record malicious user’s computer activities and keyboard stokes is called:
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Answer: B
NEW QUESTION 77
Which of the following may be considered as insider threat(s):
Answer: B
NEW QUESTION 79
Which of the following is NOT a digital forensic analysis tool:
Answer: B
NEW QUESTION 80
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the
established connections on it:
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
NEW QUESTION 84
Digital evidence must:
Answer: A
NEW QUESTION 85
The process of rebuilding and restoring the computer systems affected by an incident to normal operational stage including all the processes, policies and tools is
known as:
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
NEW QUESTION 90
Business Continuity planning includes other plans such as:
Answer: D
NEW QUESTION 92
The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use
of fault tolerant systems, as well as a solid backup and recovery strategy is known as:
Answer: B
NEW QUESTION 97
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
Answer: D
Answer: B
100% Pass Your 212-89 Exam with Our Prep Materials Via below:
https://www.certleader.com/212-89-dumps.html
https://www.2passeasy.com/dumps/212-89/
NEW QUESTION 1
A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines
over the Internet. In a DDoS attack, attackers first infect multiple systems which are known as:
A. Trojans
B. Zombies
C. Spyware
D. Worms
Answer: B
NEW QUESTION 2
The goal of incident response is to handle the incident in a way that minimizes damage and reduces recovery time and cost. Which of the following does NOT
constitute a goal of incident response?
A. Dealing with human resources department and various employee conflict behaviors.
B. Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and
data.
C. Helping personal to recover quickly and efficiently from security incidents, minimizing loss or theft and disruption of services.
D. Dealing properly with legal issues that may arise during incidents.
Answer: A
NEW QUESTION 3
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of
redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
Answer: B
NEW QUESTION 4
Which of the following is an appropriate flow of the incident recovery steps?
Answer: D
NEW QUESTION 5
Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high
volume of traffic that consumes all existing network
resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection
D. Denial of Service Attack
Answer: D
NEW QUESTION 6
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and
extent of an incident?
A. Eradication
B. Containment
C. Identification
D. Data collection
Answer: B
NEW QUESTION 7
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 8
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event’s occurrence, the harm it may
cause and is usually denoted as Risk = ?(events)X (Probability of occurrence)X?
A. Magnitude
B. Probability
C. Consequences
D. Significance
Answer: A
NEW QUESTION 9
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the
following statements is NOT true for an audit trail policy:
Answer: A
NEW QUESTION 10
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Answer: A
NEW QUESTION 10
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are
defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Answer: C
NEW QUESTION 14
Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the
risk associated with an IT system through its SDLC. How many primary steps does NIST’s risk assessment methodology involve?
A. Twelve
B. Four
C. Six
D. Nine
Answer: D
NEW QUESTION 16
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance,
tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer: A
NEW QUESTION 21
Which policy recommends controls for securing and tracking organizational resources:
Answer: D
NEW QUESTION 23
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 24
The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables
members of CSIRT to undertake any necessary actions on behalf of their constituency?
A. Full-level authority
B. Mid-level authority
C. Half-level authority
D. Shared-level authority
Answer: A
NEW QUESTION 29
Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The
personal computer of the criminal in question was confiscated by the county police. Which of the following evidence will lead John in his investigation?
A. SAM file
B. Web serve log
C. Routing table list
D. Web browser history
Answer: D
NEW QUESTION 33
An adversary attacks the information resources to gain undue advantage is called:
Answer: B
NEW QUESTION 36
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: B
NEW QUESTION 39
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 40
Incident prioritization must be based on:
A. Potential impact
B. Current damage
C. Criticality of affected systems
D. All the above
Answer: D
NEW QUESTION 44
An information security incident is
A. Any real or suspected adverse event in relation to the security of computer systems or networks
B. Any event that disrupts normal today’s business functions
C. Any event that breaches the availability of information assets
D. All of the above
Answer: D
NEW QUESTION 47
Which of the following can be considered synonymous:
Answer: A
NEW QUESTION 52
If the loss anticipated is greater than the agreed upon threshold; the organization will:
Answer: B
NEW QUESTION 55
The left over risk after implementing a control is called:
A. Residual risk
B. Unaccepted risk
C. Low risk
D. Critical risk
Answer: A
NEW QUESTION 60
In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the
system is known as:
A. Asset Identification
B. System characterization
C. Asset valuation
D. System classification
Answer: B
NEW QUESTION 61
Performing Vulnerability Assessment is an example of a:
A. Incident Response
B. Incident Handling
C. Pre-Incident Preparation
D. Post Incident Management
Answer: C
NEW QUESTION 66
The correct sequence of Incident Response and Handling is:
Answer: A
NEW QUESTION 71
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 72
The correct sequence of incident management process is:
Answer: B
NEW QUESTION 77
The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:
Answer: A
NEW QUESTION 79
The main feature offered by PGP Desktop Email is:
Answer: C
NEW QUESTION 81
The typical correct sequence of activities used by CSIRT when handling a case is:
Answer: A
NEW QUESTION 82
To respond to DDoS attacks; one of the following strategies can be used:
Answer: D
NEW QUESTION 84
The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven language, performs real-time traffic analysis and packet
logging is known as:
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Answer: A
NEW QUESTION 87
A malware code that infects computer files, corrupts or deletes the data in them and requires a host file to propagate is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
NEW QUESTION 90
_____ record(s) user’s typing.
A. Spyware
B. adware
C. Virus
D. Malware
Answer: A
NEW QUESTION 92
Which of the following is a characteristic of adware?
A. Gathering information
B. Displaying popups
C. Intimidating users
D. Replicating
Answer: B
NEW QUESTION 97
Which of the following is NOT one of the techniques used to respond to insider threats:
Answer: B
NEW QUESTION 99
Which is the incorrect statement about Anti-keyloggers scanners:
Answer: B
Answer: D
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy
Answer: C
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
A. Digital evidence
B. Computer Emails
C. Digital investigation
D. Digital Forensic Examiner
Answer: A
Answer: A
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Answer: D
Answer: D
Answer: A
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
Answer: D
Answer: C
Answer: A
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Answer: A
Visit Our Site to Purchase the Full Set of Actual 212-89 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
212-89 Product From:
https://www.2passeasy.com/dumps/212-89/
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
212-89 Dumps
https://www.certleader.com/212-89-dumps.html
NEW QUESTION 1
Which of the following is an appropriate flow of the incident recovery steps?
Answer: D
NEW QUESTION 2
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 3
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 4
Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is
responsible for examining the evidence acquired and separating the useful evidence?
A. Evidence Supervisor
B. Evidence Documenter
C. Evidence Manager
D. Evidence Examiner/ Investigator
Answer: D
NEW QUESTION 5
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Answer: A
NEW QUESTION 6
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 7
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific
requirements that the planning should address. There are five major components of the IT contingency plan, namely supporting information, notification activation,
recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution plan?
A. To restore the original site, tests systems to prevent the incident and terminates operations
B. To define the notification procedures, damage assessments and offers the plan activation
C. To provide the introduction and detailed concept of the contingency plan
D. To provide a sequence of recovery activities with the help of recovery procedures
Answer: A
NEW QUESTION 8
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 9
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 10
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it
to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
Answer: A
NEW QUESTION 10
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 15
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the
infected hosts from the information system?
Answer: B
NEW QUESTION 18
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 21
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy
that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
A. Risk Assumption
B. Research and acknowledgment
C. Risk limitation
D. Risk absorption
Answer: B
NEW QUESTION 23
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 26
An assault on system security that is derived from an intelligent threat is called:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
Answer: C
NEW QUESTION 28
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 29
Incident prioritization must be based on:
A. Potential impact
B. Current damage
C. Criticality of affected systems
D. All the above
Answer: D
NEW QUESTION 34
Which of the following can be considered synonymous:
Answer: A
NEW QUESTION 36
If the loss anticipated is greater than the agreed upon threshold; the organization will:
Answer: B
NEW QUESTION 38
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 39
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 43
Incident Response Plan requires
Answer: D
NEW QUESTION 45
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
NEW QUESTION 49
The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
NEW QUESTION 54
The very well-known free open source port, OS and service scanner and network discovery utility is called:
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
NEW QUESTION 59
A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control
the victim’s system is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
NEW QUESTION 60
The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Answer: C
NEW QUESTION 65
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs
is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
NEW QUESTION 69
The main difference between viruses and worms is:
Answer: B
NEW QUESTION 72
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could be:
Answer: D
NEW QUESTION 76
Spyware tool used to record malicious user’s computer activities and keyboard stokes is called:
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Answer: B
NEW QUESTION 77
Which of the following may be considered as insider threat(s):
Answer: B
NEW QUESTION 79
Which of the following is NOT a digital forensic analysis tool:
Answer: B
NEW QUESTION 80
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the
established connections on it:
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
NEW QUESTION 84
Digital evidence must:
Answer: A
NEW QUESTION 85
The process of rebuilding and restoring the computer systems affected by an incident to normal operational stage including all the processes, policies and tools is
known as:
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
NEW QUESTION 90
Business Continuity planning includes other plans such as:
Answer: D
NEW QUESTION 92
The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use
of fault tolerant systems, as well as a solid backup and recovery strategy is known as:
Answer: B
NEW QUESTION 97
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
Answer: D
Answer: B
100% Pass Your 212-89 Exam with Our Prep Materials Via below:
https://www.certleader.com/212-89-dumps.html
EC-Council
Exam Questions 212-89
EC Council Certified Incident Handler (ECIH v2)
NEW QUESTION 1
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and
G.
A. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Manager
B. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Manager
C. A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, FIncident Analyst, G-Public relations
D. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Coordinator
Answer: C
NEW QUESTION 2
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 3
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event’s occurrence, the harm it may
cause and is usually denoted as Risk = ?(events)X (Probability of occurrence)X?
A. Magnitude
B. Probability
C. Consequences
D. Significance
Answer: A
NEW QUESTION 4
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the
following statements is NOT true for an audit trail policy:
Answer: A
NEW QUESTION 5
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 6
The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed
A. SAM service
B. POP3 service
C. SMTP service
D. Echo service
Answer: D
NEW QUESTION 7
A US Federal agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to
agency’s reporting timeframe guidelines, this incident
should be reported within two (2) HOURS of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the
activity. Which incident category of the US Federal Agency does this incident belong to?
A. CAT 5
B. CAT 1
C. CAT 2
D. CAT 6
Answer: C
NEW QUESTION 8
Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will
maintain the information assurance (IA) and security posture of a system or site.
A. NIASAP
B. NIAAAP
C. NIPACP
D. NIACAP
Answer: D
NEW QUESTION 9
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are
defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Answer: C
NEW QUESTION 10
Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented
to handle such situations?
A. Scenario testing
B. Facility testing
C. Live walk-through testing
D. Procedure testing
Answer: D
NEW QUESTION 10
An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves
auditing the system and network log files?
A. Incident recording
B. Reporting
C. Containment
D. Identification
Answer: D
NEW QUESTION 14
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 19
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According
to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process
improvement mechanisms?
A. Protection
B. Preparation
C. Detection
D. Triage
Answer: A
NEW QUESTION 22
The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:
A. If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.
B. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.
C. If the insider’s technical literacy is high and process knowledge is low, the risk posed by the threat will be high.
D. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be high.
Answer: D
NEW QUESTION 27
Which policy recommends controls for securing and tracking organizational resources:
Answer: D
NEW QUESTION 32
Which one of the following is the correct sequence of flow of the stages in an incident response:
Answer: B
NEW QUESTION 36
Organizations or incident response teams need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally
attacked the computer system. EVIDENCE PROTECTION is also required to meet legal compliance issues. Which of the following documents helps in protecting
evidence from physical or logical damage:
Answer: B
NEW QUESTION 40
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 42
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 46
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it
to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
Answer: A
NEW QUESTION 47
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the
system identified?
A. Likelihood Determination
B. Control recommendation
C. System characterization
D. Control analysis
Answer: C
NEW QUESTION 50
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the
infected hosts from the information system?
Answer: B
NEW QUESTION 54
The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables
members of CSIRT to undertake any necessary actions on behalf of their constituency?
A. Full-level authority
B. Mid-level authority
C. Half-level authority
D. Shared-level authority
Answer: A
NEW QUESTION 59
Which of the following incidents are reported under CAT -5 federal agency category?
Answer: C
NEW QUESTION 63
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of
the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:
Answer: C
NEW QUESTION 67
An assault on system security that is derived from an intelligent threat is called:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
Answer: C
NEW QUESTION 71
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 75
If the loss anticipated is greater than the agreed upon threshold; the organization will:
Answer: B
NEW QUESTION 80
A payroll system has a vulnerability that cannot be exploited by current technology. Which of the following is correct about this scenario:
Answer: C
NEW QUESTION 83
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 87
What is correct about Quantitative Risk Analysis:
Answer: B
NEW QUESTION 89
Which of the following is a risk assessment tool:
A. Nessus
B. Wireshark
C. CRAMM
D. Nmap
Answer: C
NEW QUESTION 94
Performing Vulnerability Assessment is an example of a:
A. Incident Response
B. Incident Handling
C. Pre-Incident Preparation
D. Post Incident Management
Answer: C
NEW QUESTION 98
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 99
Incident response team must adhere to the following:
Answer: D
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
Answer: A
Answer: D
Answer: A
A. Incident Manager
B. Incident Analyst
C. Incident Handler
D. Incident coordinator
Answer: B
Answer: D
Answer: D
Answer: A
Answer: D
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
Answer: D
A. DDoS attacks
B. Unauthorized access attacks
C. Malware attacks
D. Social Engineering attacks
Answer: B
Answer: D
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
A. Honey Pots
B. Relays
C. Zombies
D. Handlers
Answer: C
Answer: D
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Answer: C
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
Answer: A
Answer: D
Answer: A
Answer: B
Answer: B
Answer: B
A. “dd” command
B. “netstat” command
C. “nslookup” command
D. “find” command
Answer: A
Answer: D
A. Digital evidence
B. Computer Emails
C. Digital investigation
D. Digital Forensic Examiner
Answer: A
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
Answer: C
Answer: B
A. Expert Witness
B. Incident Analyzer
C. Incident Responder
D. Evidence Documenter
Answer: A
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Answer: D
Answer: A
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Answer: A
A. Constitutional/ Legitimate
B. Illegal/ illegitimate
C. Unethical
D. None of the above
Answer: A
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
https://www.2passeasy.com/dumps/212-89/
NEW QUESTION 1
The goal of incident response is to handle the incident in a way that minimizes damage and reduces recovery time and cost. Which of the following does NOT
constitute a goal of incident response?
A. Dealing with human resources department and various employee conflict behaviors.
B. Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and
data.
C. Helping personal to recover quickly and efficiently from security incidents, minimizing loss or theft and disruption of services.
D. Dealing properly with legal issues that may arise during incidents.
Answer: A
NEW QUESTION 2
An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The
organization’s incident response manager, upon investigation, found that the incident must be handled within a few hours on the same day to maintain business
continuity and market competitiveness. How would you categorize such information security incident?
Answer: A
NEW QUESTION 3
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of
redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
Answer: B
NEW QUESTION 4
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and
G.
A. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Manager
B. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Manager
C. A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, FIncident Analyst, G-Public relations
D. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Coordinator
Answer: C
NEW QUESTION 5
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and
extent of an incident?
A. Eradication
B. Containment
C. Identification
D. Data collection
Answer: B
NEW QUESTION 6
An incident recovery plan is a statement of actions that should be taken before, during or after an incident. Identify which of the following is NOT an objective of the
incident recovery plan?
Answer: A
NEW QUESTION 7
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event’s occurrence, the harm it may
cause and is usually denoted as Risk = ?(events)X (Probability of occurrence)X?
A. Magnitude
B. Probability
C. Consequences
D. Significance
Answer: A
NEW QUESTION 8
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the
following statements is NOT true for an audit trail policy:
Answer: A
NEW QUESTION 9
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital
media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer
forensics process:
Answer: D
NEW QUESTION 10
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 10
Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is
responsible for examining the evidence acquired and separating the useful evidence?
A. Evidence Supervisor
B. Evidence Documenter
C. Evidence Manager
D. Evidence Examiner/ Investigator
Answer: D
NEW QUESTION 12
The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed
below, if blocked, can help in preventing Denial of Service attack?
A. SAM service
B. POP3 service
C. SMTP service
D. Echo service
Answer:
NEW QUESTION 13
US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal agency reporting categorization. What is the timeframe required to report
an incident under the CAT 4 Federal Agency category?
A. Weekly
B. Within four (4) hours of discovery/detection if the successful attack is still ongoing and agency is unable to successfully mitigate activity
C. Within two (2) hours of discovery/detection
D. Monthly
Answer: A
NEW QUESTION 16
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are
defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Answer: C
NEW QUESTION 21
Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented
to handle such situations?
A. Scenario testing
B. Facility testing
C. Live walk-through testing
D. Procedure testing
Answer: D
NEW QUESTION 23
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 27
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According
to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process
improvement mechanisms?
A. Protection
B. Preparation
C. Detection
D. Triage
Answer: A
NEW QUESTION 31
Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the
risk associated with an IT system through its SDLC. How many primary steps does NIST’s risk assessment methodology involve?
A. Twelve
B. Four
C. Six
D. Nine
Answer: D
NEW QUESTION 32
Which policy recommends controls for securing and tracking organizational resources:
Answer: D
NEW QUESTION 36
Organizations or incident response teams need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally
attacked the computer system. EVIDENCE PROTECTION is also required to meet legal compliance issues. Which of the following documents helps in protecting
evidence from physical or logical damage:
Answer: B
NEW QUESTION 38
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 41
The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for
further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup of the infected system is carried
out?
A. Containment
B. Eradication
C. Incident recording
D. Incident investigation
Answer: A
NEW QUESTION 45
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 48
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the
system identified?
A. Likelihood Determination
B. Control recommendation
C. System characterization
D. Control analysis
Answer: C
NEW QUESTION 50
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 55
The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables
members of CSIRT to undertake any necessary actions on behalf of their constituency?
A. Full-level authority
B. Mid-level authority
C. Half-level authority
D. Shared-level authority
Answer: A
NEW QUESTION 56
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 58
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large
amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
A. Analysis
B. Preparation
C. Examination
D. Collection
Answer: C
NEW QUESTION 59
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 61
An adversary attacks the information resources to gain undue advantage is called:
Answer: B
NEW QUESTION 65
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 68
A payroll system has a vulnerability that cannot be exploited by current technology. Which of the following is correct about this scenario:
Answer: C
NEW QUESTION 69
Answer: D
NEW QUESTION 73
Which of the following is a risk assessment tool:
A. Nessus
B. Wireshark
C. CRAMM
D. Nmap
Answer: C
NEW QUESTION 76
Performing Vulnerability Assessment is an example of a:
A. Incident Response
B. Incident Handling
C. Pre-Incident Preparation
D. Post Incident Management
Answer: C
NEW QUESTION 77
Preventing the incident from spreading and limiting the scope of the incident is known as:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: C
NEW QUESTION 80
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 82
Which of the following is an incident tracking, reporting and handling tool:
A. CRAMM
B. RTIR
C. NETSTAT
D. EAR/ Pilar
Answer: B
NEW QUESTION 85
Incident Response Plan requires
Answer: D
NEW QUESTION 87
The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:
D. Vulnerability Assessor
Answer: A
NEW QUESTION 89
The main feature offered by PGP Desktop Email is:
Answer: C
NEW QUESTION 92
The role that applies appropriate technology and tries to eradicate and recover from the incident is known as:
A. Incident Manager
B. Incident Analyst
C. Incident Handler
D. Incident coordinator
Answer: B
NEW QUESTION 96
CERT members can provide critical support services to first responders such as:
Answer: D
NEW QUESTION 98
The region where the CSIRT is bound to serve and what does it and give service to is known as:
A. Consistency
B. Confidentiality
C. Constituency
D. None of the above
Answer: C
Answer: A
A. Nessus
B. CyberCop
C. EtherApe
D. nmap
Answer: A
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Answer: A
Answer: D
Answer: B
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
A. adware
B. Spyware
C. Viruses
D. Worms
Answer: C
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Answer: C
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
Answer: A
Answer: A
Answer: B
A. Outsider threats
B. Social Engineers
C. Insider threats
D. Zombies
Answer: C
Answer: B
Answer: B
A. “dd” command
B. “netstat” command
C. “nslookup” command
D. “find” command
Answer: A
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: A
Answer: D
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Examiner
Answer: B
A. Digital evidence
B. Computer Emails
C. Digital investigation
D. Digital Forensic Examiner
Answer: A
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
Answer: C
A. Expert Witness
B. Incident Analyzer
C. Incident Responder
D. Evidence Documenter
Answer: A
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Answer: D
A. Forensic Analysis
B. Computer Forensics
C. Forensic Readiness
D. Steganalysis
Answer: B
Answer: B
A. Phone call
B. Facsimile (Fax)
C. Email or on-line Web form
D. All the above
Answer: D
Answer: D
Answer: C
Answer: A
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Answer: A
......
Visit Our Site to Purchase the Full Set of Actual 212-89 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
212-89 Product From:
https://www.2passeasy.com/dumps/212-89/
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
EC-Council
Exam Questions 212-89
EC Council Certified Incident Handler (ECIH v2)
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and
G.
A. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Manager
B. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Manager
C. A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, FIncident Analyst, G-Public relations
D. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, FConstituency, G-Incident Coordinator
Answer: C
NEW QUESTION 2
A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT
part of the computer risk policy?
Answer: C
NEW QUESTION 3
Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high
volume of traffic that consumes all existing network
resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection
D. Denial of Service Attack
Answer: D
NEW QUESTION 4
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event’s occurrence, the harm it may
cause and is usually denoted as Risk = ?(events)X (Probability of occurrence)X?
A. Magnitude
B. Probability
C. Consequences
D. Significance
Answer: A
NEW QUESTION 5
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the
following statements is NOT true for an audit trail policy:
Answer: A
NEW QUESTION 6
US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal agency reporting categorization. What is the timeframe required to report
an incident under the CAT 4 Federal Agency category?
A. Weekly
B. Within four (4) hours of discovery/detection if the successful attack is still ongoing and agency is unable to successfully mitigate activity
C. Within two (2) hours of discovery/detection
D. Monthly
Answer: A
NEW QUESTION 7
Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies
authorizes a group of users to perform a set of actions on a set of resources?
Answer: A
NEW QUESTION 8
An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves
auditing the system and network log files?
A. Incident recording
B. Reporting
C. Containment
D. Identification
Answer: D
NEW QUESTION 9
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 10
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According
to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process
improvement mechanisms?
A. Protection
B. Preparation
C. Detection
D. Triage
Answer: A
NEW QUESTION 10
Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the
risk associated with an IT system through its SDLC. How many primary steps does NIST’s risk assessment methodology involve?
A. Twelve
B. Four
C. Six
D. Nine
Answer: D
NEW QUESTION 14
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance,
tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer: A
NEW QUESTION 15
Which policy recommends controls for securing and tracking organizational resources:
Answer: D
NEW QUESTION 16
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 21
The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for
further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup of the infected system is carried
out?
A. Containment
B. Eradication
C. Incident recording
D. Incident investigation
Answer: A
NEW QUESTION 25
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 29
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it
to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
Answer: A
NEW QUESTION 31
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the
system identified?
A. Likelihood Determination
B. Control recommendation
C. System characterization
D. Control analysis
Answer: C
NEW QUESTION 35
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 39
An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular
job role requires the use of those resources. Which of the following is NOT a fundamental element of access control policy
Answer: B
NEW QUESTION 44
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 48
One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers’ security vulnerabilities and by responding
effectively to potential information security incidents. Identify the incident response approach that focuses on developing the infrastructure and security processes
before the occurrence or detection of an event or any incident:
A. Interactive approach
B. Introductive approach
C. Proactive approach
D. Qualitative approach
Answer: C
NEW QUESTION 51
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large
amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
A. Analysis
B. Preparation
C. Examination
D. Collection
Answer: C
NEW QUESTION 55
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of
the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:
Answer: C
NEW QUESTION 57
An assault on system security that is derived from an intelligent threat is called:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
Answer: C
NEW QUESTION 58
The largest number of cyber-attacks are conducted by:
A. Insiders
B. Outsiders
C. Business partners
D. Suppliers
Answer: B
NEW QUESTION 60
The sign of incident that may happen in the future is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: A
NEW QUESTION 61
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 66
Incident prioritization must be based on:
A. Potential impact
B. Current damage
C. Criticality of affected systems
D. All the above
Answer: D
NEW QUESTION 69
A payroll system has a vulnerability that cannot be exploited by current technology. Which of the following is correct about this scenario:
Answer: C
NEW QUESTION 70
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 75
Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?
Answer: B
NEW QUESTION 78
What is correct about Quantitative Risk Analysis:
Answer: B
NEW QUESTION 82
In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the
system is known as:
A. Asset Identification
B. System characterization
C. Asset valuation
D. System classification
Answer: B
NEW QUESTION 83
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 86
The correct sequence of incident management process is:
Answer: B
NEW QUESTION 87
The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:
Answer: A
NEW QUESTION 89
The main feature offered by PGP Desktop Email is:
Answer: C
NEW QUESTION 94
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
NEW QUESTION 96
CERT members can provide critical support services to first responders such as:
Answer: D
NEW QUESTION 97
The region where the CSIRT is bound to serve and what does it and give service to is known as:
A. Consistency
B. Confidentiality
C. Constituency
D. None of the above
Answer: C
Answer: D
A. Nessus
B. CyberCop
C. EtherApe
D. nmap
Answer: A
Answer: D
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
Answer: D
Answer: B
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
A. Spyware
B. adware
C. Virus
D. Malware
Answer: A
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: B
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
Answer: B
Answer: D
Answer: B
Answer: B
Answer: B
A. “dd” command
B. “netstat” command
C. “nslookup” command
D. “find” command
Answer: A
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: A
Answer: D
Answer: D
Answer: B
Answer: C
Answer: D
Answer: D
Answer: C
Answer: B
Answer: A
Relate Links
https://www.exambible.com/212-89-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/
https://www.2passeasy.com/dumps/212-89/
NEW QUESTION 1
The goal of incident response is to handle the incident in a way that minimizes damage and reduces recovery time and cost. Which of the following does NOT
constitute a goal of incident response?
A. Dealing with human resources department and various employee conflict behaviors.
B. Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and
data.
C. Helping personal to recover quickly and efficiently from security incidents, minimizing loss or theft and disruption of services.
D. Dealing properly with legal issues that may arise during incidents.
Answer: A
NEW QUESTION 2
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of
redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
Answer: B
NEW QUESTION 3
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 4
An incident recovery plan is a statement of actions that should be taken before, during or after an incident. Identify which of the following is NOT an objective of the
incident recovery plan?
Answer: A
NEW QUESTION 5
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital
media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer
forensics process:
Answer: D
NEW QUESTION 6
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 7
Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies
authorizes a group of users to perform a set of actions on a set of resources?
D. Documentation policy
Answer: A
NEW QUESTION 8
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Answer: A
NEW QUESTION 9
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are
defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Answer: C
NEW QUESTION 10
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 10
Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the
risk associated with an IT system through its SDLC. How many primary steps does NIST’s risk assessment methodology involve?
A. Twelve
B. Four
C. Six
D. Nine
Answer: D
NEW QUESTION 15
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance,
tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer: A
NEW QUESTION 17
The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:
A. If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.
B. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.
C. If the insider’s technical literacy is high and process knowledge is low, the risk posed by the threat will be high.
D. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be high.
Answer: D
NEW QUESTION 22
Which one of the following is the correct sequence of flow of the stages in an incident response:
Answer: B
NEW QUESTION 23
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 26
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 27
An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular
job role requires the use of those resources. Which of the following is NOT a fundamental element of access control policy
Answer: B
NEW QUESTION 30
The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables
members of CSIRT to undertake any necessary actions on behalf of their constituency?
A. Full-level authority
B. Mid-level authority
C. Half-level authority
D. Shared-level authority
Answer: A
NEW QUESTION 35
Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The
personal computer of the criminal in question was confiscated by the county police. Which of the following evidence will lead John in his investigation?
A. SAM file
B. Web serve log
C. Routing table list
D. Web browser history
Answer: D
NEW QUESTION 38
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 43
Which of the following incidents are reported under CAT -5 federal agency category?
Answer: C
NEW QUESTION 46
One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers’ security vulnerabilities and by responding
effectively to potential information security incidents. Identify the incident response approach that focuses on developing the infrastructure and security processes
before the occurrence or detection of an event or any incident:
A. Interactive approach
B. Introductive approach
C. Proactive approach
D. Qualitative approach
Answer: C
NEW QUESTION 48
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 52
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: B
NEW QUESTION 54
The largest number of cyber-attacks are conducted by:
A. Insiders
B. Outsiders
C. Business partners
D. Suppliers
Answer: B
NEW QUESTION 57
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 61
Total cost of disruption of an incident is the sum of
Answer: A
NEW QUESTION 66
An information security incident is
A. Any real or suspected adverse event in relation to the security of computer systems or networks
Answer: D
NEW QUESTION 71
Which of the following can be considered synonymous:
Answer: A
NEW QUESTION 76
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 80
The left over risk after implementing a control is called:
A. Residual risk
B. Unaccepted risk
C. Low risk
D. Critical risk
Answer: A
NEW QUESTION 82
Which of the following is a risk assessment tool:
A. Nessus
B. Wireshark
C. CRAMM
D. Nmap
Answer: C
NEW QUESTION 83
Preventing the incident from spreading and limiting the scope of the incident is known as:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: C
NEW QUESTION 84
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 87
Which of the following is an incident tracking, reporting and handling tool:
A. CRAMM
B. RTIR
C. NETSTAT
D. EAR/ Pilar
Answer: B
NEW QUESTION 92
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 97
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
Answer: A
Answer: D
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
Answer: D
Answer: D
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
A. Honey Pots
B. Relays
C. Zombies
D. Handlers
Answer: C
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Answer: A
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
A. adware
B. Spyware
C. Viruses
D. Worms
Answer: C
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
Answer: A
Answer: A
Answer: B
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Answer: B
A. Ignorant employees
B. Carless administrators
C. Disgruntled staff members
D. All the above
Answer: D
Answer: B
Answer: D
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy
Answer: C
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: A
Answer: D
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Examiner
Answer: B
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
Answer: C
A. Expert Witness
B. Incident Analyzer
C. Incident Responder
D. Evidence Documenter
Answer: A
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
Answer: D
Answer: A
Answer: B
Answer: A
Answer: C
Visit Our Site to Purchase the Full Set of Actual 212-89 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
212-89 Product From:
https://www.2passeasy.com/dumps/212-89/
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
EC-Council
Exam Questions 212-89
EC Council Certified Incident Handler (ECIH v2)
NEW QUESTION 1
Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and
technical limitations that adversely affects the organization’s operation and revenues?
A. Risk
B. Vulnerability
C. Threat
D. Incident Response
Answer: A
NEW QUESTION 2
A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines
over the Internet. In a DDoS attack, attackers first infect multiple systems which are known as:
A. Trojans
B. Zombies
C. Spyware
D. Worms
Answer: B
NEW QUESTION 3
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of
redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
Answer: B
NEW QUESTION 4
A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT
part of the computer risk policy?
Answer: C
NEW QUESTION 5
Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high
volume of traffic that consumes all existing network
resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection
D. Denial of Service Attack
Answer: D
NEW QUESTION 6
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system.
These programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a
stranger.
A. Cookie tracker
B. Worm
C. Trojan
D. Virus
Answer: C
NEW QUESTION 7
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 8
Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is
responsible for examining the evidence acquired and separating the useful evidence?
A. Evidence Supervisor
B. Evidence Documenter
C. Evidence Manager
D. Evidence Examiner/ Investigator
Answer: D
NEW QUESTION 9
US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal agency reporting categorization. What is the timeframe required to report
an incident under the CAT 4 Federal Agency category?
A. Weekly
B. Within four (4) hours of discovery/detection if the successful attack is still ongoing and agency is unable to successfully mitigate activity
C. Within two (2) hours of discovery/detection
D. Monthly
Answer: A
NEW QUESTION 10
Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will
maintain the information assurance (IA) and security posture of a system or site.
A. NIASAP
B. NIAAAP
C. NIPACP
D. NIACAP
Answer: D
NEW QUESTION 10
Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies
authorizes a group of users to perform a set of actions on a set of resources?
Answer: A
NEW QUESTION 15
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are
defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Answer: C
NEW QUESTION 19
In the Control Analysis stage of the NIST’s risk assessment methodology, technical and none technical control methods are classified into two categories. What
are these two control categories?
Answer: A
NEW QUESTION 23
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 27
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance,
tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer: A
NEW QUESTION 30
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 32
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the
system identified?
A. Likelihood Determination
B. Control recommendation
C. System characterization
D. Control analysis
Answer: C
NEW QUESTION 35
A security policy will take the form of a document or a collection of documents, depending on the situation or usage. It can become a point of reference in case a
violation occurs that results in dismissal or other penalty. Which of the following is NOT true for a good security policy?
A. It must be enforceable with security tools where appropriate and with sanctions where actual prevention is not technically feasible
B. It must be approved by court of law after verifications of the stated terms and facts
C. It must be implemented through system administration procedures, publishing of acceptable use guide lines or other appropriate methods
D. It must clearly define the areas of responsibilities of the users, administrators and management
Answer: B
NEW QUESTION 38
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the
infected hosts from the information system?
Answer: B
NEW QUESTION 39
An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular
job role requires the use of those resources. Which of the following is NOT a fundamental element of access control policy
Answer: B
NEW QUESTION 44
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 45
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large
amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
A. Analysis
B. Preparation
C. Examination
D. Collection
Answer: C
NEW QUESTION 50
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of
the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:
Answer: C
NEW QUESTION 51
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 52
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: B
NEW QUESTION 57
The largest number of cyber-attacks are conducted by:
A. Insiders
B. Outsiders
C. Business partners
D. Suppliers
Answer: B
NEW QUESTION 58
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 62
A payroll system has a vulnerability that cannot be exploited by current technology. Which of the following is correct about this scenario:
Answer: C
NEW QUESTION 65
Absorbing minor risks while preparing to respond to major ones is called:
A. Risk Mitigation
B. Risk Transfer
C. Risk Assumption
D. Risk Avoidance
Answer: C
NEW QUESTION 66
In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the
system is known as:
A. Asset Identification
B. System characterization
C. Asset valuation
D. System classification
Answer: B
NEW QUESTION 67
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 68
Incident response team must adhere to the following:
Answer: D
NEW QUESTION 71
Which of the following is an incident tracking, reporting and handling tool:
A. CRAMM
B. RTIR
C. NETSTAT
D. EAR/ Pilar
Answer: B
NEW QUESTION 74
Which of the following is a correct statement about incident management, handling and response:
Answer: A
NEW QUESTION 78
The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:
Answer: A
NEW QUESTION 83
The main feature offered by PGP Desktop Email is:
Answer: C
NEW QUESTION 85
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
NEW QUESTION 87
CERT members can provide critical support services to first responders such as:
Answer: D
NEW QUESTION 89
The region where the CSIRT is bound to serve and what does it and give service to is known as:
A. Consistency
B. Confidentiality
C. Constituency
D. None of the above
Answer: C
NEW QUESTION 92
CSIRT can be implemented at:
Answer: D
NEW QUESTION 96
The typical correct sequence of activities used by CSIRT when handling a case is:
Answer: A
NEW QUESTION 97
Installing a password cracking tool, downloading pornography material, sending emails to colleagues which irritates them and hosting unauthorized websites on
the company’s computer are considered:
Answer: D
A. DDoS attacks
B. Unauthorized access attacks
C. Malware attacks
D. Social Engineering attacks
Answer: B
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Answer: A
Answer: B
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
A. adware
B. Spyware
C. Viruses
D. Worms
Answer: C
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Answer: C
is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
Answer: C
Answer: B
Answer: D
Answer: A
Answer: B
Answer: A
Answer: D
Answer: B
A. “dd” command
B. “netstat” command
C. “nslookup” command
D. “find” command
Answer: A
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: A
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Examiner
Answer: B
Answer: A
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Answer: D
Answer: D
Answer: B
Answer: A
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
Answer: D
Answer: A
Answer: C
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
Answer: D
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Answer: A
A. Constitutional/ Legitimate
B. Illegal/ illegitimate
C. Unethical
D. None of the above
Answer: A
Answer: C
Answer: B
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
https://www.2passeasy.com/dumps/212-89/
NEW QUESTION 1
Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and
technical limitations that adversely affects the organization’s operation and revenues?
A. Risk
B. Vulnerability
C. Threat
D. Incident Response
Answer: A
NEW QUESTION 2
An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The
organization’s incident response manager, upon investigation, found that the incident must be handled within a few hours on the same day to maintain business
continuity and market competitiveness. How would you categorize such information security incident?
Answer: A
NEW QUESTION 3
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of
redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
Answer: B
NEW QUESTION 4
Which of the following is an appropriate flow of the incident recovery steps?
Answer: D
NEW QUESTION 5
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 6
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the
following statements is NOT true for an audit trail policy:
Answer: A
NEW QUESTION 7
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 8
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific
requirements that the planning should address. There are five major components of the IT contingency plan, namely supporting information, notification activation,
recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution plan?
A. To restore the original site, tests systems to prevent the incident and terminates operations
B. To define the notification procedures, damage assessments and offers the plan activation
C. To provide the introduction and detailed concept of the contingency plan
D. To provide a sequence of recovery activities with the help of recovery procedures
Answer: A
NEW QUESTION 9
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of
an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incident
D. Focuses on the incident and handles it from management and technical point of view
Answer: B
NEW QUESTION 10
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it
to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
Answer: A
NEW QUESTION 10
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the
system identified?
A. Likelihood Determination
B. Control recommendation
C. System characterization
D. Control analysis
Answer: C
NEW QUESTION 13
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 14
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the
infected hosts from the information system?
Answer: B
NEW QUESTION 19
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 21
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large
amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
A. Analysis
B. Preparation
C. Examination
D. Collection
Answer: C
NEW QUESTION 25
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: B
NEW QUESTION 28
Total cost of disruption of an incident is the sum of
Answer: A
NEW QUESTION 31
What is correct about Quantitative Risk Analysis:
Answer: B
NEW QUESTION 35
Which of the following is a risk assessment tool:
A. Nessus
B. Wireshark
C. CRAMM
D. Nmap
Answer: C
NEW QUESTION 40
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 42
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
NEW QUESTION 44
CSIRT can be implemented at:
Answer: D
NEW QUESTION 47
Common name(s) for CSIRT is(are)
Answer: D
NEW QUESTION 52
An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:
A. Nessus
B. CyberCop
C. EtherApe
D. nmap
Answer: A
NEW QUESTION 57
The very well-known free open source port, OS and service scanner and network discovery utility is called:
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
NEW QUESTION 60
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs
is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
NEW QUESTION 61
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:
Answer: C
NEW QUESTION 66
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could be:
Answer: D
NEW QUESTION 67
Which of the following is NOT one of the common techniques used to detect Insider threats:
Answer: A
NEW QUESTION 68
The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an
investigation is called:
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy
Answer: C
NEW QUESTION 69
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the
established connections on it:
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
NEW QUESTION 71
Which of the following is NOT one of the Computer Forensic types:
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
Answer: C
NEW QUESTION 72
Electronic evidence may reside in the following:
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Answer: D
NEW QUESTION 76
A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be
presented in a court of law in a coherent and meaningful format is called:
A. Forensic Analysis
B. Computer Forensics
C. Forensic Readiness
D. Steganalysis
Answer: B
NEW QUESTION 80
Incidents are reported in order to:
Answer: D
NEW QUESTION 84
Business Continuity planning includes other plans such as:
C. Contingency plan
D. All the above
Answer: D
NEW QUESTION 88
The product of intellect that has commercial value and includes copyrights and trademarks is called:
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Answer: A
NEW QUESTION 91
The most common type(s) of intellectual property is(are):
Answer: D
NEW QUESTION 96
According to the Fourth Amendment of USA PATRIOT Act of 2001; if a search does NOT violate a person’s “reasonable” or “legitimate” expectation of privacy
then it is considered:
A. Constitutional/ Legitimate
B. Illegal/ illegitimate
C. Unethical
D. None of the above
Answer: A
Visit Our Site to Purchase the Full Set of Actual 212-89 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
212-89 Product From:
https://www.2passeasy.com/dumps/212-89/
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
https://www.2passeasy.com/dumps/212-89/
NEW QUESTION 1
The goal of incident response is to handle the incident in a way that minimizes damage and reduces recovery time and cost. Which of the following does NOT
constitute a goal of incident response?
A. Dealing with human resources department and various employee conflict behaviors.
B. Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and
data.
C. Helping personal to recover quickly and efficiently from security incidents, minimizing loss or theft and disruption of services.
D. Dealing properly with legal issues that may arise during incidents.
Answer: A
NEW QUESTION 2
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of
redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
Answer: B
NEW QUESTION 3
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated
as:
Answer: A
NEW QUESTION 4
An incident recovery plan is a statement of actions that should be taken before, during or after an incident. Identify which of the following is NOT an objective of the
incident recovery plan?
Answer: A
NEW QUESTION 5
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital
media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer
forensics process:
Answer: D
NEW QUESTION 6
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Answer: A
NEW QUESTION 7
Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies
authorizes a group of users to perform a set of actions on a set of resources?
D. Documentation policy
Answer: A
NEW QUESTION 8
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Answer: A
NEW QUESTION 9
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are
defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Answer: C
NEW QUESTION 10
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with
all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Answer: D
NEW QUESTION 10
Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the
risk associated with an IT system through its SDLC. How many primary steps does NIST’s risk assessment methodology involve?
A. Twelve
B. Four
C. Six
D. Nine
Answer: D
NEW QUESTION 15
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance,
tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer: A
NEW QUESTION 17
The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:
A. If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.
B. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.
C. If the insider’s technical literacy is high and process knowledge is low, the risk posed by the threat will be high.
D. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be high.
Answer: D
NEW QUESTION 22
Which one of the following is the correct sequence of flow of the stages in an incident response:
Answer: B
NEW QUESTION 23
In a qualitative risk analysis, risk is calculated in terms of:
Answer: C
NEW QUESTION 26
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you
categorize this type of account?
Answer: A
NEW QUESTION 27
An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular
job role requires the use of those resources. Which of the following is NOT a fundamental element of access control policy
Answer: B
NEW QUESTION 30
The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables
members of CSIRT to undertake any necessary actions on behalf of their constituency?
A. Full-level authority
B. Mid-level authority
C. Half-level authority
D. Shared-level authority
Answer: A
NEW QUESTION 35
Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The
personal computer of the criminal in question was confiscated by the county police. Which of the following evidence will lead John in his investigation?
A. SAM file
B. Web serve log
C. Routing table list
D. Web browser history
Answer: D
NEW QUESTION 38
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be
categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Answer: D
NEW QUESTION 43
Which of the following incidents are reported under CAT -5 federal agency category?
Answer: C
NEW QUESTION 46
One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers’ security vulnerabilities and by responding
effectively to potential information security incidents. Identify the incident response approach that focuses on developing the infrastructure and security processes
before the occurrence or detection of an event or any incident:
A. Interactive approach
B. Introductive approach
C. Proactive approach
D. Qualitative approach
Answer: C
NEW QUESTION 48
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Answer: A
NEW QUESTION 52
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Answer: B
NEW QUESTION 54
The largest number of cyber-attacks are conducted by:
A. Insiders
B. Outsiders
C. Business partners
D. Suppliers
Answer: B
NEW QUESTION 57
Incidents such as DDoS that should be handled immediately may be considered as:
Answer: C
NEW QUESTION 61
Total cost of disruption of an incident is the sum of
Answer: A
NEW QUESTION 66
An information security incident is
A. Any real or suspected adverse event in relation to the security of computer systems or networks
Answer: D
NEW QUESTION 71
Which of the following can be considered synonymous:
Answer: A
NEW QUESTION 76
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
Answer: D
NEW QUESTION 80
The left over risk after implementing a control is called:
A. Residual risk
B. Unaccepted risk
C. Low risk
D. Critical risk
Answer: A
NEW QUESTION 82
Which of the following is a risk assessment tool:
A. Nessus
B. Wireshark
C. CRAMM
D. Nmap
Answer: C
NEW QUESTION 83
Preventing the incident from spreading and limiting the scope of the incident is known as:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: C
NEW QUESTION 84
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Answer: A
NEW QUESTION 87
Which of the following is an incident tracking, reporting and handling tool:
A. CRAMM
B. RTIR
C. NETSTAT
D. EAR/ Pilar
Answer: B
NEW QUESTION 92
Removing or eliminating the root cause of the incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Answer: A
NEW QUESTION 97
Which of the following service(s) is provided by the CSIRT:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Answer: D
Answer: A
Answer: D
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Answer: B
Answer: D
Answer: D
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Answer: B
A. Honey Pots
B. Relays
C. Zombies
D. Handlers
Answer: C
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Answer: A
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: C
A. adware
B. Spyware
C. Viruses
D. Worms
Answer: C
A. Trojan
B. Worm
C. Virus
D. RootKit
Answer: A
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Answer: B
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
Answer: A
Answer: A
Answer: B
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Answer: B
A. Ignorant employees
B. Carless administrators
C. Disgruntled staff members
D. All the above
Answer: D
Answer: B
Answer: D
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy
Answer: C
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: B
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Answer: A
Answer: D
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Examiner
Answer: B
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
Answer: C
A. Expert Witness
B. Incident Analyzer
C. Incident Responder
D. Evidence Documenter
Answer: A
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Answer: C
Answer: D
Answer: A
Answer: B
Answer: A
Answer: C
Visit Our Site to Purchase the Full Set of Actual 212-89 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
212-89 Product From:
https://www.2passeasy.com/dumps/212-89/
* 212-89 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 212-89 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year