Pass4itsure > EC-COUNCIL > ECIH > 212-89 > 212-89 Online Practice Questions and Answers

212-89 Online Practice Questions and Answers

Questions 4

Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?

A. Evidence Supervisor

B. Evidence Documenter

C. Evidence Manager

D. Evidence Examiner/ Investigator

Buy Now
Questions 5

The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:

A. If the insider's technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.

B. If the insider's technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.

C. If the insider's technical literacy is high and process knowledge is low, the risk posed by the threat will be high.

D. If the insider's technical literacy and process knowledge are high, the risk posed by the threat will be high.

Buy Now
Questions 6

Which of the following incidents are reported under CAT -5 federal agency category?

A. Exercise/ Network Defense Testing

B. Malicious code

C. Scans/ probes/ Attempted Access

D. Denial of Service DoS

Buy Now
Questions 7

Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?

A. Apply the control

B. Not to apply the control

C. Use qualitative risk assessment

D. Use semi-qualitative risk assessment instead

Buy Now
Questions 8

An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:

A. Nessus

B. CyberCop

C. EtherApe

D. nmap

Buy Now
Questions 9

The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:

A. Snort

B. Wireshark

C. Cain and Able

D. nmap

Buy Now
Questions 10

To respond to DDoS attacks; one of the following strategies can be used:

A. Using additional capacity to absorb attack

B. Identifying none critical services and stopping them

C. Shut down some services until the attack has subsided

D. All the above

Buy Now
Questions 11

A Malicious code attack using emails is considered as:

A. Malware based attack

B. Email attack

C. Inappropriate usage incident

D. Multiple component attack

Buy Now
Questions 12

What command does a Digital Forensic Examiner use to display the list of all IP addresses and their associated MAC addresses on a victim computer to identify the machines that were communicating with it:

A. "arp" command

B. "netstat 璦n" command

C. "dd" command

D. "ifconfig" command

Buy Now
Questions 13

Which of the following is NOT one of the Computer Forensic types:

A. USB Forensics

B. Email Forensics

C. Forensic Archaeology

D. Image Forensics

Buy Now
Exam Code: 212-89
Exam Name: EC-Council Certified Incident Handler
Last Update: Apr 27, 2024
Questions: 163
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99