Winter Sepecial Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 2

Questions 11

James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.

Which of the following commands helps James in determining all the executable files for running processes?

Options:
A.

cate A &. time ,/t

B.

netstat -ab

C.

top

D.

doskey/history

ECCouncil 212-89 Premium Access
Questions 12

In which of the following types of insider threats an insider who is uneducated on

potential security threats or simply bypasses general security procedures to meet

workplace efficiency?

Options:
A.

Compromised insider

B.

Negligent insider

C.

Professional insider

D.

Malicious insider

Questions 13

Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?

Options:
A.

HR log book

B.

Point of contact

C.

Email list

D.

Phone number list

Questions 14

Ross is an incident manager (IM) at an organization, and his team provides support to all users in the organization who are affected by threats or attacks. David, who is the organization's internal auditor, is also part of Ross's incident response team. Which of the following is David's responsibility?

Options:
A.

Configure information security controls.

B.

Identify and report security loopholes to the management for necessary action.

C.

Coordinate incident containment activities with the information security officer (ISO).

D.

Perform the- necessary action to block the network traffic from the suspectoc intruder.

Questions 15

Eric works as a system administrator in ABC organization. He granted privileged users with unlimited permissions to access the systems. These privileged users can misuse

their rights unintentionally or maliciously or attackers can trick them to perform malicious activities.

Which of the following guidelines helps incident handlers to eradicate insider attacks by privileged users?

Options:
A.

Do not use encryption methods to prevent administrators and privileged users from accessing backup tapes and sensitive information

B.

Do not control the access to administrators and privileged users

C.

Do not enable the default administrative accounts to ensure accountability

D.

Do not allow administrators to use unique accounts during the installation process

Questions 16

Following a high-profile breach investigation at a multinational corporation, an incident handler is tasked with the critical role of preserving, packaging, and transporting digital evidence from a server believed to be compromised and utilized as part of a global botnet operation. The challenge lay not only in the technical complexities of the operation but also in adhering to stringent legal and procedural frameworks to ensure the evidence remained admissible in court. Which of the following options ensures the highest level of evidence integrity during its transport?

Options:
A.

On-site encryption of the server’s data, followed by its upload to secure cloud storage.

B.

Creating a forensic image of the server's drives, verifying image hashes, storing images on encrypted drives, and maintaining detailed transport logs.

C.

Encasing the server in anti-static packaging with chain-of-custody labels.

D.

Transferring server data to a new drive using a write blocker and GPS tracking.

Questions 17

During routine checks, EduSoft, an educational software provider, identified malware within their digital examination tools. This malware not only provided answers to students but mined personal data. With a digital forensic tool and an encryption protocol tool, what's the ideal primary action?

Options:
A.

Disable the examination tool until further notice.

B.

Alert educational institutions about the compromised software.

C.

Use the forensic tool to ascertain the malware's source and method of operation.

D.

Deploy the encryption tool to safeguard students' data.

Questions 18

Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?

Options:
A.

Malware

B.

Bolen

C.

Unvalidated redirects and forwards

D.

SQL injection

Questions 19

Bran is an incident handler who is assessing the network of the organization. In the

process, he wants to detect ping sweep attempts on the network using Wireshark tool.

Which of the following Wireshark filter he must use to accomplish this task?

Options:
A.

icmp.seq

B.

icmp.redir_gw

C.

icmp.type==8

D.

icmp.ident

Questions 20

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

Options:
A.

Risk assessment

B.

Risk assumption

C.

Risk mitigation

D.

Risk avoidance

Exam Code: 212-89
Certification Provider: ECCouncil
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Feb 12, 2026
Questions: 272