Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECIH 212-89 ECCouncil Study Notes

Page: 21 / 23
Total 305 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 81

A logistics company relying heavily on cloud-based inventory management discovered unauthorized activity initiated by a third-party contractor. The investigation revealed that the contractor's login was reused across multiple departments and lacked any tracking mechanism or role-specific restrictions to limit its scope. What cloud security best practice should be implemented to prevent such violations?

Options:

A.

Enforcement of strict user access control and credential isolation

B.

Use of anonymized data during inventory analytics

C.

Routine vulnerability scans on mobile apps used by delivery teams

D.

Implementation of Secure Sockets Layer (SSL) encryption on internal systems

Question 82

A mid-sized tech company leveraging a cloud-based infrastructure noticed unauthorized interactions between cloud-hosted applications. Upon investigation, the security team discovered confusion over whether internal teams or the cloud provider were tasked with overseeing certain services, which caused delays in the incident response. Which action would best support managing this cloud security incident?

Options:

A.

Performing regular vulnerability scans on container images

B.

Assigning all incident response tasks to external cloud support teams

C.

Understanding shared responsibilities for incident response in cloud environments

D.

Disabling automatic scaling features to prevent service misuse

Question 83

FinFusion, a leading finance firm, discovered a slow leak of financial data over several months. Surprisingly, the leak was attributed to a high-ranking executive who was selling data to competitors. Keen on avoiding future breaches, what should be FinFusion's foremost action?

Options:

A.

Use advanced Employee Monitoring Tools that offer real-time threat alerts.

B.

Limit executive access to sensitive databases.

C.

Require weekly reports from executives on their data access and usage.

D.

Install security cameras in executive offices.

Question 84

An IT security analyst at a logistics firm is alerted to unusual outbound traffic originating from an employee’s mobile device connected to the corporate VPN. Antivirus scans fail to remove the malware, indicating persistence. The organization cannot afford further data leakage. Which action should the incident handler take next?

Options:

A.

Disable the SIM card.

B.

Switch the device to airplane mode.

C.

Perform a factory reset or reinstall the mobile OS.

D.

Restrict background app refresh for social apps.

Page: 21 / 23
Total 305 questions