New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 7

Questions 61

Michael, a digital forensic responder, enters a server room after a suspected data breach. He ensures all individuals not involved in the investigation are escorted out, avoids altering any device configurations, and isolates the server from the network without powering it down. What is the main goal of Michael's actions?

Options:
A.

Creating a chain of custody

B.

Collecting volatile memory

C.

Securing and evaluating the crime scene

D.

Cloning the affected server

ECCouncil 212-89 Premium Access
Questions 62

An Azure administrator discovers unauthorized access to a storage account containing sensitive documents. The initial investigation suggests compromised credentials. In response to this incident, what should be the administrator's first action to secure the account?

Options:
A.

Move sensitive documents to a new storage account with restricted access.

B.

Reset the credentials of the compromised account and review all recent access logs.

C.

Contact Azure support for an immediate investigation and assistance.

D.

Enable Azure Multi-Factor Authentication (MFA) for all user accounts accessing the storage.

Questions 63

A user downloaded what appears to be genuine software. Unknown to her, when she installed the application, it executed code that provided an unauthorized remote attacker access to her computer. What type of malicious threat displays this characteristic?

Options:
A.

Backdoor

B.

Trojan

C.

Spyware

D.

Virus

Questions 64

An Azure administrator discovers unauthorized access to a storage account containing sensitive documents. The initial investigation suggests compromised credentials. In response to this incident, what should be the administrator's first action to secure the account?

Options:
A.

Move sensitive documents to a new storage account with restricted access.

B.

Reset the credentials of the compromised account and review all recent access logs.

C.

Contact Azure support for an immediate investigation and assistance.

D.

Enable Azure Multi-Factor Authentication (MFA) for all user accounts accessing the storage.

Questions 65

In which of the following confidentiality attacks attackers try to lure users by posing themselves as authorized AP by beaconing the WLAN's SSID?

Options:
A.

Evil twin AP

B.

Session hijacking

C.

Honeypot AP

D.

Masqueradin

Questions 66

Which of the following email security tools can be used by an incident handler to

prevent the organization against evolving email threats?

Options:
A.

Email Header Analyzer

B.

G Suite Toolbox

C.

MxToolbox

D.

Gpg4win

Questions 67

After unearthing malware within their AI-based prediction systems, Future Tech Corp realized that their business projections were skewed. This malware was not just altering data but was equipped with machine learning capabilities, evolving its methods. With access to a dedicated AI security module and a database restoration tool, what's the primary step?

Options:
A.

Restore the database to a point before malware infiltration.

B.

Deploy the AI-security module to counteract and remove the evolved malware.

C.

Disable the AI prediction system and rely on manual predictions temporarily.

D.

Inform business partners about potentially skewed projections.

Questions 68

Ethan, part of the IH&R team, receives a phishing email targeting employees with a link to reset passwords. He hovers over the link and notices a discrepancy between the visible URL and the hyperlink. He cross-verifies the sender’s email structure and subject tone to detect further red flags. Which phishing detection approach is Ethan using?

Options:
A.

Content encoding validation

B.

Firewall signature matching

C.

URL shortening detection

D.

Manual phishing email verification

Questions 69

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

Options:
A.

Vulnerability assessment phase

B.

Post-investigation phase

C.

Pre-investigation phase

D.

Investigation phase

Questions 70

Jason is setting up a computer forensics lab and must perform the following steps: 1. physical location and structural design considerations; 2. planning and budgeting; 3. work area considerations; 4. physical security recommendations; 5. forensic lab licensing; 6. human resource considerations. Arrange these steps in the order of execution.

Options:
A.

2 -> 1 -> 3 -> 6 -> 4 -> 5

B.

2->3->l ->4->6->5

C.

5-> 2-> l-> 3-> 4-> 6

D.

3 .> 2 -> 1 -> 4-> 6-> 5

Exam Code: 212-89
Certification Provider: ECCouncil
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Jan 13, 2026
Questions: 272