[Q53-Q69] Full 212-89 Practice Test and 165 unique questions with explanations waiting just for you!

Full 212-89 Practice Test and 165 unique questions with explanations waiting just for you!

ECIH Certification Dumps 212-89 Exam for Full Questions – Exam Study Guide

QUESTION 53
Which of the following is a correct statement about incident management, handling and response:

 
 
 
 

QUESTION 54
Identify the network security incident where intended authorized users are prevented from using system,
network, or applications by flooding the network with high volume of traffic that consumes all existing network
resources.

 
 
 
 

QUESTION 55
To recover, analyze, and preserve computer and related materials in such a way that it can be presented as evidence in a court of law and identify the evidence in short time, estimate the potential impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator is known as:

 
 
 
 

QUESTION 56
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?

 
 
 
 

QUESTION 57
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the
worm include:

 
 
 
 

QUESTION 58
A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is
targeted by a large number of infected machines over the Internet. In a DDoS attack, attackers first infect
multiple systems which are known as:

 
 
 
 

QUESTION 59
Total cost of disruption of an incident is the sum of

 
 
 
 

QUESTION 60
A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful format is called:

 
 
 
 

QUESTION 61
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:

 
 
 
 

QUESTION 62
They type of attack that prevents the authorized users to access networks, systems, or applications by exhausting the network resources and sending illegal requests to an application is known as:

 
 
 
 

QUESTION 63
Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?

 
 
 
 

QUESTION 64
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing
equipment, various storage devices and or digital media that can be presented in a course of law in a coherent
and meaningful format. Which one of the following is an appropriate flow of steps in the computer forensics
process:

 
 
 
 

QUESTION 65
Spyware tool used to record malicious user’s computer activities and keyboard stokes is called:

 
 
 
 

QUESTION 66
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could be:

 
 
 
 

QUESTION 67
Ensuring the integrity, confidentiality and availability of electronic protected health information of a patient is known as:

 
 
 
 

QUESTION 68
US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal agency reporting
categorization. What is the timeframe required to report an incident under the CAT 4 Federal Agency category?

 
 
 
 

QUESTION 69
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the following statements is NOT true for an audit trail policy:

 
 
 
 

Authentic Best resources for 212-89 Online Practice Exam: https://www.exams4sures.com/EC-COUNCIL/212-89-practice-exam-dumps.html

         

4/5 - (4 votes)

Add a Comment

Your email address will not be published. Required fields are marked *

Enter the text from the image below