Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

212-89 Leak Questions

Page: 11 / 13
Total 172 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 41

James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.

Which of the following commands helps James in determining all the executable files for running processes?

Options:

A.

cate A &. time ,/t

B.

netstat -ab

C.

top

D.

doskey/history

Question 42

Which of the following is NOT a network forensic tool?

Options:

A.

Capsa Network Analyzer

B.

Tcpdurnp

C.

Advancec NTFS Journaling Parser

D.

Wireshark

Question 43

BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?

Options:

A.

Anti-forensics

B.

Adversarial mechanics

C.

Felony

D.

Legal hostility

Question 44

Michael is an incident handler at CyberTech Solutions. He is performing detection and analysis of a cloud security incident. He is analyzing the file systems, slack spaces, and

metadata of the storage units to find hidden malware and evidence of malice.

Identify the cloud security incident handled by Michael.

Options:

A.

Network-related incident

B.

Storage-related incident

C.

Application-related incident

D.

Server-related incident

Page: 11 / 13
Total 172 questions