Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 3

Questions 21

Lina, a threat responder, uses the Nuix Adaptive Security tool to analyze alerts of suspicious file uploads. She identifies that an insider used Outlook to send attachments to unknown email addresses during off-hours. The tool captures screenshots, file metadata, and keystroke logs. What type of evidence is Lina primarily relying on?

Options:
A.

User behavior analytics and endpoint monitoring

B.

SIEM event correlation

C.

Network forensics logs

D.

Host-based intrusion prevention logs

ECCouncil 212-89 Premium Access
Questions 22

An attacker traced out and found the kind of websites a target company/individual is

frequently surfing and tested those particular websites to identify any possible

vulnerabilities. When the attacker detected vulnerabilities in the website, the attacker

started injecting malicious script/code into the web application that can redirect the

webpage and download the malware onto the victim’s machine. After infecting the

vulnerable web application, the attacker waited for the victim to access the infected web

application.

Identify the type of attack performed by the attacker.

Options:
A.

Watering hole

B.

Obfuscation application

C.

Directory traversal

D.

Cookie/Session poisoning

Questions 23

Which of the following is NOT part of the static data collection process?

Options:
A.

Evidence oxa mi nation

B.

System preservation

C.

Password protection

D.

Evidence acquisition

Questions 24

In which of the following types of insider threats an insider who is uneducated on

potential security threats or simply bypasses general security procedures to meet

workplace efficiency?

Options:
A.

Compromised insider

B.

Negligent insider

C.

Professional insider

D.

Malicious insider

Questions 25

An IT security analyst at a logistics firm is alerted to unusual outbound traffic originating from an employee’s mobile device connected to the corporate VPN. Antivirus scans fail to remove the malware, indicating persistence. The organization cannot afford further data leakage. Which action should the incident handler take next?

Options:
A.

Disable the SIM card.

B.

Switch the device to airplane mode.

C.

Perform a factory reset or reinstall the mobile OS.

D.

Restrict background app refresh for social apps.

Questions 26

A company facing a wave of spoofed payment emails launched an investigation and found that employees had unknowingly interacted with malicious sender domains. Despite blocking initial IPs and purging visible email content, similar threats resurfaced using altered variants. The team moved to eliminate recurring delivery mechanisms and close technical loopholes. Which step is most aligned with this eradication initiative?

Options:
A.

Contacting email domain registrars to request WHOIS masking of sender information

B.

Launching email-based simulation drills to evaluate user response to phishing

C.

Reviewing the email training curriculum related to financial transaction safety

D.

Creating email-specific URL deny-lists from decoded message components

Questions 27

Investigator Ian gives you a drive image to investigate. What type of analysis are you performing?

Options:
A.

Real-time

B.

Static

C.

Dynamic

D.

Live

Questions 28

AlphaTech recently discovered signs of an advanced persistent threat (APT) in its infrastructure. The incident response team is trying to gather more information about the threat to form a comprehensive response strategy. While leveraging threat intelligence platforms, which of the following approaches would be most effective in gathering detailed and actionable insights about the APT?

Options:
A.

Searching for IOCs related to known APT campaigns and comparing them with observed patterns.

B.

Collaborating with industry peers to understand similar threats and observed TTPs.

C.

Obtaining historical data on common cyber threats to predict future movements.

D.

Gathering information from open-source forums and integrating it internally.

Questions 29

Ethan, an incident handler, reviews traffic logs showing abnormal connections from internal devices to high-risk external domains. He traces these back to a misconfigured IoT device using outdated firmware. What kind of indicator was key in identifying the issue?

Options:
A.

Large ICMP payloads

B.

Unauthorized ARP broadcast

C.

Suspicious outbound connections

D.

Incorrect DNS caching

Questions 30

Allan performed a reconnaissance attack on his corporate network as part of a red-team activity. He scanned the IP range to find live host IP addresses. What type of technique did he use to exploit the network?

Options:
A.

DNS foot printing

B.

Social engineering

C.

Port scanning

D.

Ping sweeping