New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 212-89 Practice Exam with Questions & Answers | Set: 8

Questions 71

Bonney’s system has been compromised by a gruesome malware.

What is the primary step that is advisable to Bonney in order to contain the malware

incident from spreading?

Options:
A.

Turn off the infected machine

B.

Leave it to the network administrators to handle

C.

Complaint to police in a formal way regarding the incident

D.

Call the legal department in the organization and inform about the incident

ECCouncil 212-89 Premium Access
Questions 72

Liam, a senior incident responder at a manufacturing company, is alerted to an email campaign distributing malware through fake invoice attachments. He confirms that some users opened the attachment, resulting in system slowdown and unauthorized access attempts. He disconnects affected machines, scans and removes malware, disables compromised accounts, restores systems from clean backups, and documents file hashes, sender IPs, and malicious domains. Which of the following best describes Liam’s objective?

Options:
A.

To simulate future phishing scenarios

B.

To conduct forensic preservation

C.

To upgrade the internal mail server infrastructure

D.

To eradicate all traces of the incident

Questions 73

SafePay, an online payment portal, recently introduced an advanced search feature. A week later, users reported unauthorized transactions. Investigation showed attackers exploited advanced search strings and a previously unidentified vulnerability. What is SafePay's best immediate action?

Options:
A.

Implement multi-factor authentication for all user accounts.

B.

Disable the advanced search feature and revert to the older version.

C.

Require users to re-authenticate before accessing advanced search.

D.

Increase the encryption level of stored user data.

Questions 74

Which of the following processes is referred to as an approach to respond to the

security incidents that occurred in an organization and enables the response team by

ensuring that they know exactly what process to follow in case of security incidents?

Options:
A.

Risk assessment

B.

Incident response orchestration

C.

Vulnerability management

D.

Threat assessment

Questions 75

An attack on a network is BEST blocked using which of the following?

Options:
A.

IPS device inline

B.

HIPS

C.

Web proxy

D.

Load balancer

Questions 76

Sophia, an incident handler at a cloud hosting provider, is investigating reports of intermittent web server slowdowns and timeouts. Upon analyzing router logs, she finds an unusually high number of incomplete connection attempts, causing the server’s memory and CPU resources to spike. Suspecting a form of resource exhaustion attack, she applies a protective configuration to the router that allows it to validate connection requests before they reach the server. Soon after this change, the number of partial connections decreases, and the server regains stable performance. What was the purpose of this action?

Options:
A.

To scan for malicious payloads

B.

To prevent brute-force logins

C.

To block SYN flood attempts

D.

To monitor port scans

Questions 77

Aarav, an IT support specialist, identifies that multiple employees have engaged with an email promoting free shopping vouchers, which appears suspicious. To minimize the potential threat, he instructs staff to report the message, classify it as junk, and remove it from their inboxes. He further advises them not to interact with similar messages in the future, even if they seem to come from internal contacts. Which best practice is Aarav reinforcing?

Options:
A.

Sort emails by priority

B.

Digitally sign email attachments

C.

Disable preview pane in the inbox

D.

Avoid replying to or forwarding suspicious emails

Questions 78

After a recent upgrade, users of Trend Spot encountered slow website load times. Analysis revealed attackers flooding the application with fake search requests, causing an application-layer DoS attack. How should Trend Spot primarily respond?

Options:
A.

Regularly clear the server cache.

B.

Shift to a more robust hosting provider.

C.

Introduce rate limiting on search request functionality.

D.

Implement IP address-based blocking for suspicious traffic.

Questions 79

Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?

Options:
A.

HR log book

B.

Point of contact

C.

Email list

D.

Phone number list

Questions 80

DigitalSoft, a major software development firm, recently discovered unauthorized access to its codebase. The culprit was a disgruntled employee who had been overlooked for a promotion. The company wants to prevent such insider threats in the future. What is the most effective measure it can implement?

Options:
A.

Implement mandatory password changes every 30 days.

B.

Implement a strict hierarchy where only senior employees have access to sensitive data.

C.

Use biometric authentication for accessing sensitive data.

D.

Conduct regular audits of user access and use behavior analytics.

Exam Code: 212-89
Certification Provider: ECCouncil
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Jan 13, 2026
Questions: 272