Certbus > EC-COUNCIL > EC-COUNCIL Certifications > 212-89 > 212-89 Online Practice Questions and Answers

212-89 Online Practice Questions and Answers

Questions 4

Which of the following is an appropriate flow of the incident recovery steps?

A. System Operation-System Restoration-System Validation-System Monitoring

B. System Validation-System Operation-System Restoration-System Monitoring

C. System Restoration-System Monitoring-System Validation-System Operations

D. System Restoration-System Validation-System Operations-System Monitoring

Browse 163 Q&As
Questions 5

Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?

A. NET-CERT

B. DFN-CERT

C. Funet CERT

D. SURFnet-CERT

Browse 163 Q&As
Questions 6

Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the risk associated with an IT system through its SDLC. How many primary steps does NIST's risk assessment methodology involve?

A. Twelve

B. Four

C. Six

D. Nine

Browse 163 Q&As
Questions 7

The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:

A. A Precursor

B. An Indication

C. A Proactive

D. A Reactive

Browse 163 Q&As
Questions 8

Which of the following is a correct statement about incident management, handling and response:

A. Incident response is on the functions provided by incident handling

B. Incident handling is on the functions provided by incident response

C. Triage is one of the services provided by incident response

D. Incident response is one of the services provided by triage

Browse 163 Q&As
Questions 9

The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:

A. Computer Security Incident Response Team CSIRT

B. Security Operations Center SOC

C. Digital Forensics Examiner

D. Vulnerability Assessor

Browse 163 Q&As
Questions 10

The main feature offered by PGP Desktop Email is:

A. Email service during incidents

B. End-to-end email communications

C. End-to-end secure email service

D. None of the above

Browse 163 Q&As
Questions 11

An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:

A. Nessus

B. CyberCop

C. EtherApe

D. nmap

Browse 163 Q&As
Questions 12

The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:

A. Snort

B. Wireshark

C. Cain and Able

D. nmap

Browse 163 Q&As
Questions 13

Which of the following is a characteristic of adware?

A. Gathering information

B. Displaying popups

C. Intimidating users

D. Replicating

Browse 163 Q&As
Questions 14

A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control the victim's system is called:

A. Trojan

B. Worm

C. Virus

D. RootKit

Browse 163 Q&As
Questions 15

A software application in which advertising banners are displayed while the program is running that delivers ads to display pop-up windows or bars that appears on a computer screen or browser is called:

A. adware (spelled all lower case)

B. Trojan

C. RootKit

D. Virus

E. Worm

Browse 163 Q&As
Questions 16

Which of the following is NOT one of the techniques used to respond to insider threats:

A. Placing malicious users in quarantine network, so that attack cannot be spread

B. Preventing malicious users from accessing unclassified information

C. Disabling the computer systems from network connection

D. Blocking malicious user accounts

Browse 163 Q&As
Questions 17

The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:

A. Computer Forensics

B. Digital Forensic Analysis

C. Forensic Readiness

D. Digital Forensic Policy

Browse 163 Q&As
Questions 18

The product of intellect that has commercial value and includes copyrights and trademarks is called:

A. Intellectual property

B. Trade secrets

C. Logos

D. Patents

Browse 163 Q&As
Exam Code: 212-89
Exam Name: EC-Council Certified Incident Handler (ECIH)
Last Update: Mar 16, 2025
Questions: 163 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99