Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 212-89 Practice Exam with Questions & Answers

Questions 1

Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used for further investigation of the incident. In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?

Options:
A.

Containment

B.

Incident recording

C.

Incident triage

D.

Eradication

ECCouncil 212-89 Premium Access
Questions 2

Meera, part of the Incident Handling & Response (IH&R) team, identifies an ongoing phishing campaign targeting internal employees. She immediately circulates an organization-wide alert, warning staff not to engage with the suspicious email. Along with the alert, she provides visual cues and instructions on how to recognize similar phishing threats in the future. Her goal is to prevent further damage and strengthen employee awareness. What additional action would best align with Meera’s eradication efforts?

Options:
A.

Installing anti-DDoS tools

B.

Sharing threat details with security forums

C.

Issuing server restart commands

D.

Deleting user accounts

Questions 3

Nervous Nat often sends emails with screenshots of what he thinks are serious incidents, but they always turn out to be false positives. Today, he sends another screenshot, suspecting a nation-state attack. As usual, you go through your list of questions, check your resources for information to determine whether the screenshot shows a real attack, and determine the condition of your network. Which step of IR did you just perform?

Options:
A.

Recovery

B.

Preparation

C.

Remediation

D.

Detection anc analysis (or identification)

Questions 4

Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in

Florida. She was asked to work on an incident response plan. As part of the plan, she

decided to enhance and improve the security infrastructure of the enterprise. She has

incorporated a security strategy that allows security professionals to use several

protection layers throughout their information system. Due to multiple layer protection,

this security strategy assists in preventing direct attacks against the organization’s

information system as a break in one layer only leads the attacker to the next layer.

Identify the security strategy Shally has incorporated in the incident response plan.

Options:
A.

Defense-in-depth

B.

Three-way handshake

C.

Covert channels

D.

Exponential backoff algorithm

Questions 5

QualTech Solutions is a leading security services enterprise. Dickson, who works as an incident responder with this firm, is performing a vulnerability assessment to identify the security problems in the network by using automated tools for identifying the hosts, services, and vulnerabilities in the enterprise network. In the above scenario, which of the following types of vulnerability assessment is Dickson performing?

Options:
A.

Active assessment

B.

External assessment

C.

Internal assessment

D.

Passive assessment

Questions 6

Michael, a digital forensic responder, enters a server room after a suspected data breach. He ensures all individuals not involved in the investigation are escorted out, avoids altering any device configurations, and isolates the server from the network without powering it down. What is the main goal of Michael's actions?

Options:
A.

Creating a chain of custody

B.

Collecting volatile memory

C.

Securing and evaluating the crime scene

D.

Cloning the affected server

Questions 7

A multinational corporation with a diverse computing environment experiences a sophisticated malware attack targeting its endpoint devices. The malware is designed to evade traditional antivirus solutions and establish a persistent backdoor for data exfiltration. This incident underscores the complex landscape of endpoint security and the evolving threat vectors. In this context, what is the most critical reason for establishing a robust endpoint security incident handling and response capability?

Options:
A.

To facilitate real-time threat intelligence sharing across the industry.

B.

To ensure compliance with international data protection regulations.

C.

To mitigate financial losses associated with data breaches and system downtime.

D.

To enable rapid containment and eradication of threats to maintain business continuity.

Questions 8

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.

Options:
A.

3-->6-->1-->2-->5-->4-->7

B.

1-->3-->2-->4-->5-->6-->7

C.

4-->1-->2-->3-->6-->5-->7

D.

2-->1-->4-->7-->5-->6-->3

Questions 9

WebMega, a leading e-commerce giant with over a billion users, suffered a massive data breach, compromising sensitive user data, including financials. During the containment phase, IH&R teams discovered a meticulous attack pattern that bypassed multiple security layers, hinting at an insider's involvement. Investigations revealed that three recently fired employees, with ties to a rival company, had possible motives and means. How should WebMega proceed?

Options:
A.

Reinforce security measures across the board, with a focus on employee access controls, without addressing the potential insider threat directly.

B.

Collaborate with external forensic experts and law enforcement agencies to conduct a thorough investigation while maintaining confidentiality.

C.

Reach out to the rival company's leadership, seeking an off-the-record resolution without involving legal channels.

D.

Publicly accuse the rival company of corporate espionage and initiate legal proceedings based on the initial evidence.

Questions 10

Logan, a network security analyst, notices a pattern of repeated ICMP echo requests being sent to a broad range of IP addresses within the company's internal subnet. To confirm his suspicion of a possible reconnaissance attempt, he opens Wireshark and starts analyzing the traffic for unusual scanning behavior. What technique is most likely being used by the attacker?

Options:
A.

DNS poisoning

B.

Ping sweep

C.

Port scanning

D.

SYN flooding