Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following is a term that describes the combination of strategies and services intended to restore data, applications, and other resources to the public cloud or dedicated service providers?

Options:
A.

Mitigation

B.

Analysis

C.

Eradication

D.

Cloud recovery

ECCouncil 212-89 Premium Access
Questions 32

Richard is analyzing a corporate network. After an alert in the network’s IPS. he identified that all the servers are sending huge amounts of traffic to the website abc.xyz. What type of information security attack vectors have affected the network?

Options:
A.

Botnet

B.

Advance persistent three Is

C.

Ransomware

D.

IOT threats

Questions 33

Eric works as a system administrator at ABC organization and previously granted several users with access privileges to the organizations systems with unlimited permissions. These privileged users could prospectively misuse their rights unintentionally, maliciously, or could be deceived by attackers that could trick them to perform malicious activities. Which of the following guidelines would help incident handlers eradicate insider attacks by privileged users?

Options:
A.

Do not allow administrators to use unique accounts during the installation process

B.

Do not enable default administrative accounts to ensure accountability

C.

Do not control the access to administrator ano privileged users

D.

Do not use encryption methods to prevent, administrators and privileged users from accessing backup tapes and sensitive information

Questions 34

An incident handler is analyzing email headers to find out suspicious emails.

Which of the following tools he/she must use in order to accomplish the task?

Options:
A.

Barracuda Email Security Gateway

B.

Gophish

C.

SPAMfighter

Questions 35

Which of the following risk mitigation strategies involves the execution of controls to reduce the risk factor and bring it to an acceptable level, or accepts the potential risk and continues operating the IT system?

Options:
A.

Risk avoidance

B.

Risk assumption

C.

Risk transference

D.

Risk planning

Questions 36

A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?

Options:
A.

On-prom installation

B.

saaS

C.

laaS

D.

PaaS

Questions 37

Francis is an incident handler and security expert. He works at MorisonTech Solutions based in Sydney, Australia. He was assigned a task to detect phishing/spam mails for the client organization.

Which of the following tools can assist Francis to perform the required task?

Options:
A.

Netcraft

B.

Nessus

C.

BTCrack

D.

Cain and Abel

Questions 38

In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?

Options:
A.

Incident recording and assignment

B.

Containment

C.

Notification

D.

Incident triage

Questions 39

Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system. These

programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.

Options:
A.

Worm

B.

Adware

C.

Virus

D.

Trojan

Questions 40

An organization's customers are experiencing either slower network communication or unavailability of services. In addition, network administrators are receiving alerts from security tools such as IDS/IPS and firewalls about a possible DoS/DDoS attack. In result, the organization requests the incident handling and response (IH&R) team further investigates the incident. The IH&R team decides to use manual techniques to detect DoS/DDoS attack.

Which of the following commands helps the IH&R team to manually detect DoS/DDoS attack?

Options:
A.

netstat -r

B.

nbtstat /c

C.

netstat an

D.

nbtstat/S

Exam Code: 212-89
Certification Provider: ECCouncil
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Jul 12, 2025
Questions: 172