Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 5

Questions 41

Robert is an incident handler working for Xsecurity Inc. One day, his organization

faced a massive cyberattack and all the websites related to the organization went

offline. Robert was on duty during the incident and he was responsible to handle the

incident and maintain business continuity. He immediately restored the web application

service with the help of the existing backups.

According to the scenario, which of the following stages of incident handling and

response (IH&R) process does Robert performed?

Options:
A.

Evidence gathering and forensics analysis

B.

Eradication

C.

Notification

D.

Recovery

ECCouncil 212-89 Premium Access
Questions 42

Which of the following encoding techniques replaces unusual ASCII characters with

"%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

Options:
A.

URL encoding

B.

Unicode encoding

C.

Base64 encoding

D.

HTML encoding

Questions 43

Employee monitoring tools are mostly used by employers to find which of the following?

Options:
A.

Lost registry keys

B.

Conspiracies

C.

Malicious insider threats

D.

Stolen credentials

Questions 44

Tara, a certified first responder in a digital forensics team, is dispatched to investigate a suspected insider attack targeting a critical workstation in the finance department. Upon arriving at the scene, she takes a methodical approach: she begins labeling all connected network cables, photographs the back panel of the workstation, documents cable connections, and records the power status of each connected device, including peripherals like external drives and monitors. She also notes the orientation and placement of equipment on the desk and the surrounding environment.

These actions are part of her protocol to ensure that, if the devices need to be moved for forensic analysis, investigators can accurately replicate the system’s physical setup at the time of the incident. What is Tara aiming to achieve with these actions?

Options:
A.

Create a physical reconstruction reference

B.

Maintain the continuity of system uptime

C.

Capture device logs in real-time

D.

Execute evidence integrity hashing

Questions 45

Elena, a first responder at a multinational firm, receives multiple reports from employees claiming they were asked to update their payroll information through an email that appears to be from HR. The email includes a URL directing users to a login page identical to the company’s intranet but hosted on an unfamiliar domain. Elena immediately informs the IH&R team, preserves the email headers, captures screenshots of the spoofed page, and blocks the domain at the network level. What type of email security incident is Elena handling?

Options:
A.

DNS cache poisoning

B.

Mail storm attack

C.

Email spamming

D.

Deceptive phishing attack

Questions 46

EnviroTech, a global environmental research institute, faced anomalies in six months of satellite weather data. Unauthorized data modification entries were found in logs, occurring in microbursts with minimal traces. While the intent was unclear, the implications were significant. What's the optimal response?

Options:
A.

Immediately release a public statement urging data crosschecks.

B.

Approach international cybersecurity agencies speculating nation-state involvement.

C.

Isolate the affected systems, initiate a thorough forensic examination, and revert to the most recent unaltered backup.

D.

Collaborate with global institutes to identify discrepancies without revealing a breach.

Questions 47

Raven is a part of an IH&R team and was informed by her manager to handle and lead the removal of the root cause for an incident and to close all attack vectors to prevent similar incidents in the future. Raven notifies the service providers and developers of affected resources. Which of the following steps of the incident handling and response process does Raven need to implement to remove the root cause of the incident?

Options:
A.

Evidence gathering and forensic analysis

B.

Eracicotion

C.

Containment

D.

Incident triage

Questions 48

Which of the following is a common tool used to help detect malicious internal or compromised actors?

Options:
A.

User behavior analytics

B.

SOC2 compliance report

C.

Log forward ng

D.

Syslog configuration

Questions 49

Stenley is an incident handler working for Texa Corp. located in the United States. With the growing concern of increasing emails from outside the organization, Stenley was

asked to take appropriate actions to keep the security of the organization intact. In the process of detecting and containing malicious emails, Stenley was asked to check the

validity of the emails received by employees.

Identify the tools he can use to accomplish the given task.

Options:
A.

PointofMail

B.

Email Dossier

C.

PoliteMail

D.

EventLog Analyzer

Questions 50

MegaHealth, a global healthcare provider, experienced a sudden malfunction in its MRI machines. Investigations revealed malware that tweaked MRI results and communicated with an external command-and-control server. With tools like an advanced endpoint protection system and a network monitor, what should be the first step?

Options:
A.

Inform the patients about a potential compromise of their data.

B.

Use the network monitor to identify and block the C&C server communication.

C.

Update the MRI machines' firmware and software.

D.

Deploy the endpoint protection on MRI machines to detect and halt the malware.