Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECIH 212-89 Release Date

Page: 23 / 23
Total 305 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 89

Identify Sarbanes–Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of

securities analysts.

Options:

A.

Title VIII: Corporate and Criminal Fraud Accountability

B.

Title V: Analyst Conflicts of Interest

C.

Title VII: Studies and Reports

D.

Title IX: White-Collar-Crime Penalty Enhancement

Question 90

Lina, a threat responder, uses the Nuix Adaptive Security tool to analyze alerts of suspicious file uploads. She identifies that an insider used Outlook to send attachments to unknown email addresses during off-hours. The tool captures screenshots, file metadata, and keystroke logs. What type of evidence is Lina primarily relying on?

Options:

A.

User behavior analytics and endpoint monitoring

B.

SIEM event correlation

C.

Network forensics logs

D.

Host-based intrusion prevention logs

Question 91

Khai was tasked with examining the logs from a Linux email server. The server uses Sendmail to execute the command to send emailsand Syslog to maintain logs. To validate the data within email headers, which of the following directories should Khai check for information such as source and destination IP addresses, dates, and timestamps?

Options:

A.

/Var/log/mailog

B.

/✓ar/log/sendmail

C.

/va r/log/mai11og

D.

/va r/log/sendmail/mailog

Page: 23 / 23
Total 305 questions