Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECIH 212-89 Full Course Free

Page: 17 / 23
Total 305 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 65

In the wake of a sophisticated cyber attack at a global financial institution involving encrypted data exfiltration, an incident handler must preserve volatile memory for forensic investigation. What should be the incident handler's immediate action?

Options:

A.

Deploy forensic tools to capture volatile memory using trusted tools.

B.

Isolate the network segment and power down machines.

C.

Prioritize capturing system memory immediately, then secure the scene.

D.

Conduct preliminary documentation before any evidence preservation.

Question 66

NovoMed discovers encrypted data transfers of drug research and participant data to an unknown location and receives an extortion-like message implying the formula may be released. What is the most prudent course of action?

Options:

A.

Immediately recall the drug from the market.

B.

Publicly announce the breach warning competitors and authorities.

C.

Negotiate with the attackers discreetly to buy time and retrieve data.

D.

Engage local law enforcement and international cybercrime agencies to trace the transfer’s origins.

Question 67

DigitalSoft, a major software development firm, recently discovered unauthorized access to its codebase. The culprit was a disgruntled employee who had been overlooked for a promotion. The company wants to prevent such insider threats in the future. What is the most effective measure it can implement?

Options:

A.

Implement mandatory password changes every 30 days.

B.

Implement a strict hierarchy where only senior employees have access to sensitive data.

C.

Use biometric authentication for accessing sensitive data.

D.

Conduct regular audits of user access and use behavior analytics.

Question 68

BetaCorp, a multinational corporation, identified an employee selling company secrets to competitors. BetaCorp wants to prevent such incidents in the future. Which action will be most effective?

Options:

A.

Conduct surprise bag checks at office exits.

B.

Implement an Employee Monitoring Tool to track digital activities.

C.

Regularly change office locations of employees.

D.

Introduce random polygraph tests.

Page: 17 / 23
Total 305 questions