Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

212-89 EC Council Certified Incident Handler (ECIH v3) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

212-89 Practice Questions

EC Council Certified Incident Handler (ECIH v3)

Last Update 23 hours ago
Total Questions : 305

Dive into our fully updated and stable 212-89 practice test platform, featuring all the latest ECIH exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECIH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 212-89. Use this test to pinpoint which areas you need to focus your study on.

212-89 PDF

212-89 PDF (Printable)
$43.75
$124.99

212-89 Testing Engine

212-89 PDF (Printable)
$50.75
$144.99

212-89 PDF + Testing Engine

212-89 PDF (Printable)
$63.7
$181.99
Question # 31

Bran is an incident handler who is assessing the network of the organization. In the

process, he wants to detect ping sweep attempts on the network using Wireshark tool.

Which of the following Wireshark filter he must use to accomplish this task?

Options:

A.  

icmp.seq

B.  

icmp.redir_gw

C.  

icmp.type==8

D.  

icmp.ident

Discussion 0
Question # 32

Alexis is working as an incident responder in XYZ organization. She was asked to identify and attribute the actors behind an attack that took place recently. In order to do so, she is performing threat attribution that deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target. Which of the following types of threat attributions Alexis performed?

Options:

A.  

Nation-state attribution

B.  

Intrusion-set attribution

C.  

True attribution

D.  

Campaign attributio

Discussion 0
Question # 33

Lena, a SOC analyst, observes a pattern of unusual login attempts originating from multiple foreign IP addresses tied to shared drive links circulating within the organization. These links were embedded in emails appearing to come from the HR department and marked with urgent subject lines. Upon deeper inspection, Lena finds multiple similar messages still pending in the mail server’s delivery queue. To prevent widespread exposure, she takes immediate action to eliminate these messages before they reach employees' inboxes. Which incident response action best describes Lena’s action?

Options:

A.  

Preemptively purging queued phishing emails from the server

B.  

Flagging login anomalies for correlation in the SIEM

C.  

Initiating forensic triage on suspicious attachments

D.  

Isolating compromised mailboxes from the email relay

Discussion 0
Question # 34

Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?

Options:

A.  

Campaign attribution

B.  

True attribution

C.  

Nation-state attribution

D.  

Intrusion set attribution

Discussion 0
Question # 35

Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high-profile executives of the company. What type of phishing attack is this?

Options:

A.  

Pharming

B.  

Whaling

C.  

Puddle phishing

D.  

Spear phishing

Discussion 0
Question # 36

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

Options:

A.  

AP misconfiguration

B.  

Wardriving

C.  

Rogue access point

D.  

Ad hoc associations

Discussion 0
Question # 37

During a routine investigation, Daniel, a threat analyst, notices repetitive failed login attempts in server logs with HTTP POST requests and status code 200 across several entries. At log entry 117, a 302 redirect status is recorded for the same user account. What type of attack is this indicative of?

Options:

A.  

Dictionary attack

B.  

Session hijacking

C.  

SQL injection

D.  

CSRF attack

Discussion 0
Question # 38

A global bank's IH&R team is investigating an intricate cyber-espionage campaign. Advanced persistent threat (APT) actors exfiltrated sensitive financial data over several months using both software vulnerabilities and human errors. What is the MOST appropriate immediate action for the IH&R team?

Options:

A.  

Conduct organization-wide cybersecurity awareness training.

B.  

Publicize the breach to comply with laws.

C.  

Focus solely on patching known vulnerabilities.

D.  

Leverage an Incident Response Automation and Orchestration (IRAO) tool to correlate data and automate threat hunting.

Discussion 0
Question # 39

Otis is an incident handler working in Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis

was asked to take the charge and look into the matter. While auditing the enterprise security, he found the traces of an attack, where the proprietary information was stolen

from the enterprise network and was passed onto the competitors.

Which of the following information security incidents Delmont organization faced?

Options:

A.  

Network and resource abuses

B.  

Unauthorized access

C.  

Espionage

D.  

Email-based abuse

Discussion 0
Question # 40

You are a systems administrator for a company. You are accessing your file server remotely for maintenance. Suddenly, you are unable to access the server. After contacting others in your department, you find out that they cannot access the file server either. You can ping the file server but not connect to it via RDP. You check the Active Directory Server, and all is well. You check the email server and find that emails are sent and received normally. What is the most likely issue?

Options:

A.  

An e-mail service issue

B.  

The file server has shut down

C.  

A denial-of-service issue

D.  

An admin account issue

Discussion 0
Get 212-89 dumps and pass your exam in 24 hours!

Free Exams Sample Questions