최신 212-89 무료덤프 - EC-COUNCIL EC Council Certified Incident Handler (ECIH v3)
Which of the following tools helps incident responders effectively contain a potential cloud security incident and gather required forensic evidence?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a type of malicious code or software that appears legitimate but can take control of your computer?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following terms refers to the personnel that the incident handling and response (IH&R) team must contact to report the incident and obtain the necessary permissions?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked. Which of the following is the current policy that Rica identified?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is the BEST method to prevent email incidents?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An attacker after performing an attack decided to wipe evidences using artifact wiping techniques to evade forensic investigation. He applied magnetic field to the digital media device, resulting in an entirely clean device of any previously stored data.
Identify the artifact wiping technique used by the attacker.
Identify the artifact wiping technique used by the attacker.
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Chandler is a professional hacker who is targeting Technote organization. He wants to obtain important organizational information that is being transmitted between different hierarchies. In the process, he is sniffing the data packets transmitted through the network and then analyzing them to gather packet details such as network, ports, protocols, devices, issues in network transmission, and other network specifications. Which of the following tools Chandler must employ to perform packet analysis?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Otis is an incident handler working in an organization called Delmont. Recently, the organization faced several setbacks in business, whereby its revenues are decreasing. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found traces of an attack through which proprietary information was stolen from the enterprise network and passed onto their competitors. Which of the following information security incidents did Delmont face?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)