Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECIH 212-89 Book

Page: 9 / 23
Total 305 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 33

Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?

Options:

A.

behaviorial analysis

B.

Physical detection

C.

Profiling

D.

Mole detection

Question 34

Which of the following methods help incident responders to reduce the false-positive

alert rates and further provide benefits of focusing on topmost priority issues reducing

potential risk and corporate liabilities?

Options:

A.

Threat profiling

B.

Threat contextualization

C.

Threat correlation

D.

Threat attribution

Question 35

The cybersecurity response team at a global enterprise receives an alert from an employee regarding a suspicious email that appears to be from a senior executive. During the investigation, the team analyzes the email header and notices that the sending IP address originates from a foreign country that has no affiliation with the organization. A WHOIS lookup confirms that the IP is registered under an unknown entity. What key element helped identify the suspicious activity?

Options:

A.

Bounce-back analysis

B.

Spam filter logs

C.

DKIM verification

D.

Originating IP trace

Question 36

Mason, an incident responder, detects a large volume of traffic from an internal host to external IP addresses during non-business hours. The affected host also shows signs of elevated memory and CPU consumption. AIDA64 Extreme logs confirm the system was under continuous strain for hours. What should Mason suspect as the primary issue?

Options:

A.

High resource utilization due to inappropriate usage

B.

Network misconfiguration

C.

Unauthorized hardware installation

D.

Improper access control policy

Page: 9 / 23
Total 305 questions