Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 4

Questions 31

In the gaming industry, Playverse Ltd. noticed that their latest game had an unauthorized “mod” that allowed players unique abilities. However, this mod was malicious, altering in-game purchases and accessing players’ financial details. Having tools like a real-time game environment scanner and a user-behavior monitor, what’s the best initial approach?

Options:
A.

Use the environment scanner to detect and remove the unauthorized mod.

B.

Push an update to disable all mods for the game.

C.

Announce the mod's risks on official channels and urge players to uninstall it.

D.

Monitor player behaviors to identify those using the mod and restrict access.

ECCouncil 212-89 Premium Access
Questions 32

Which of the following is a term that describes the combination of strategies and services intended to restore data, applications, and other resources to the public cloud or dedicated service providers?

Options:
A.

Mitigation

B.

Analysis

C.

Eradication

D.

Cloud recovery

Questions 33

Rose is an incident-handling person and she is responsible for detecting and eliminating

any kind of scanning attempts over the network by any malicious threat actors. Rose

uses Wireshark tool to sniff the network and detect any malicious activities going on.

Which of the following Wireshark filters can be used by her to detect TCP Xmas scan

attempt by the attacker?

Options:
A.

tcp.dstport==7

B.

tcp.flags==0X000

C.

tcp.flags.reset==1

D.

tcp.flags==0X029

Questions 34

Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?

Options:
A.

behaviorial analysis

B.

Physical detection

C.

Profiling

D.

Mole detection

Questions 35

Jake, a senior incident responder in a financial institution's SOC, receives a high-severity alert from the intrusion detection system (IDS). The alert indicates a flood of SYN packets targeting the internal web server, which has now become sluggish and unresponsive to legitimate client requests. The sudden surge in half-open connections is causing resource exhaustion on the server. Suspecting a SYN flood attack—a type of denial-of-service (DoS) attack—Jake needs to verify the source and nature of the traffic to determine the appropriate containment and mitigation strategy while preserving system integrity and uptime. What step should Jake take first in response to this suspected DoS incident?

Options:
A.

Notify HR to instruct employees on mandatory password resets

B.

Disconnect all users from the network to isolate the server

C.

Inspect network traffic to confirm the attack pattern and verify source behavior

D.

Reboot the affected server to restore availability

Questions 36

A company utilizing multiple cloud services aims to enhance its posture against cloud security incidents. Among the following options, which constitutes the best practice for achieving this goal?

Options:
A.

Regularly conduct penetration testing exclusively on critical cloud assets.

B.

Focus on physical security measures at company offices.

C.

Centralize logging and monitoring across all cloud services for improved visibility and anomaly detection.

D.

Implement a single cloud service provider strategy.

Questions 37

Emily, a member of the cybersecurity response team, receives an alert indicating suspicious login attempts on the company’s internal HR portal. Upon inspection, she finds several failed login attempts from a foreign IP address targeting administrative accounts. Further investigation reveals that one of the accounts was compromised and its privileges were escalated. What indicator most strongly suggests this is an unauthorized access incident?

Options:
A.

New system process creation

B.

Log entries showing access to critical files

C.

High CPU utilization

D.

Suspicious DNS activity

Questions 38

FinTechHub, a financial tech startup, experienced a Cross-Site Scripting (XSS) attack on their main application. Post the incident the team is keen on implementing proactive measures to handle such vulnerabilities. What should be their primary focus to prevent future XSS attacks?

Options:
A.

Deploy a network-based intrusion detection system (IDS).

B.

Sanitize and validate all user inputs across the application.

C.

Regularly patch and update the server operating system.

D.

Implement rate limiting on the application.

Questions 39

A large retail company recently migrated its customer data to a public cloud service. Shortly after, they noticed suspicious activities indicating a potential data breach. The incident response team faces multiple challenges due to the cloud's shared responsibility model, including limited access to underlying infrastructure and logs. Which action is most critical for the incident response team to perform first?

Options:
A.

Request immediate access to all infrastructure logs from the cloud service provider.

B.

Begin an internal audit of all cloud service configurations and permissions.

C.

Notify customers about the potential data breach to comply with data protection regulations.

D.

Isolate affected systems by modifying cloud security group settings.

Questions 40

During an incident involving suspected unauthorized data access, Sophia, a system administrator, immediately isolates the affected system from the network to prevent further communication. She ensures no one tampers with the device, restricts access to the area, and notifies the incident response team. What role is Sophia performing as a first responder?

Options:
A.

Documenting the chain of custody

B.

Collecting detailed evidence logs

C.

Performing advanced forensic analysis

D.

Protecting the integrity of the crime scene