Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following is a technique used by attackers to make a message difficult to understand through the use of ambiguous language?

Options:
A.

Steganography

B.

Spoofing

C.

Encryption

D.

Obfuscation

ECCouncil 212-89 Premium Access
Questions 22

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

Options:
A.

Vulnerability assessment phase

B.

Post-investigation phase

C.

Pre-investigation phase

D.

Investigation phase

Questions 23

Eric works as a system administrator in ABC organization. He granted privileged users with unlimited permissions to access the systems. These privileged users can misuse

their rights unintentionally or maliciously or attackers can trick them to perform malicious activities.

Which of the following guidelines helps incident handlers to eradicate insider attacks by privileged users?

Options:
A.

Do not use encryption methods to prevent administrators and privileged users from accessing backup tapes and sensitive information

B.

Do not control the access to administrators and privileged users

C.

Do not enable the default administrative accounts to ensure accountability

D.

Do not allow administrators to use unique accounts during the installation process

Questions 24

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

Options:
A.

AP misconfiguration

B.

Wardriving

C.

Rogue access point

D.

Ad hoc associations

Questions 25

Which stage of the incident response and handling process involves auditing the system and network log files?

Options:
A.

Containment

B.

Incident triage

C.

Incident disclosure

D.

Incident eradication

Questions 26

SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?

Options:
A.

Private key infrastructure

B.

Private key in for ma lion

C.

Public key information

D.

Public key infrastructure

Questions 27

An organization implemented an encoding technique to eradicate SQL injection

attacks. In this technique, if a user submits a request using single-quote and some

values, then the encoding technique will convert it into numeric digits and letters

ranging from a to f. This prevents the user request from performing SQL injection

attempt on the web application.

Identify the encoding technique used by the organization.

Options:
A.

Unicode encoding

B.

Base64 encoding

C.

Hex encoding

D.

URL encoding

Questions 28

Matt is an incident handler working for one of the largest social network companies, which was affected by malware. According to the company’s reporting timeframe guidelines, a malware incident should be reported within 1 h of discovery/detection after its spread across the company. Which category does this incident belong to?

Options:
A.

CAT 1

B.

CAT 4

C.

CAT 2

D.

CAT 3

Questions 29

Ikeo Corp, hired an incident response team to assess the enterprise security. As part of the incident handling and response process, the IR team is reviewing the current security policies implemented by the enterprise. The IR team finds that employees of the organization do not have any restrictions on Internet access: they are allowed to visit any site, download any application, and access a computer or network from a remote location. Considering this as the main security threat, the IR team plans to change this policy as it can be easily exploited by attackers. Which of the following security policies is the IR team planning to modify?

Options:
A.

Paranoid policy

B.

Prudent policy

C.

Promiscuous policy

D.

Permissive policy

Questions 30

Which of the following GPG18 and Forensic readiness planning (SPF) principles states

that “organizations should adopt a scenario based Forensic Readiness Planning

approach that learns from experience gained within the business”?

Options:
A.

Principle 3

B.

Principle 2

C.

Principle 5

D.

Principle 7

Exam Code: 212-89
Certification Provider: ECCouncil
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Jul 15, 2025
Questions: 172