Winter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Helping Hand Questions for 212-89

Page: 20 / 20
Total 272 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 77

Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?

Options:

A.

Denial of service (DoS) attack

B.

Fraud and theft

C.

Unauthorized access

D.

Malicious code or insider threat attack

Question 78

Following a security alert, the incident response team at a legal consulting firm suspects that an employee used a USB storage device to exfiltrate confidential client data. To confirm which USB device was connected and gather timestamps and identifiers, which method is most effective?

Options:

A.

Check Windows registry entries under Enum\USB.

B.

Scan network logs for USB file upload patterns.

C.

Review Windows SetupAPI.dev.log file entries.

D.

Use WHOIS lookup to trace USB activity.

Question 79

During routine monitoring, a cloud-based application hosting provider detects an anomaly suggesting an ongoing DDoS attack targeting one of its hosted applications. The provider's incident response team must quickly mitigate the attack while ensuring minimal service disruption. Which of the following strategies should they prioritize?

Options:

A.

Immediately scale up application resources to absorb the attack impact.

B.

Enable geo-restriction to block incoming traffic from regions not serviced by the application.

C.

Temporarily take the affected application offline to stop the attack.

D.

Implement rate limiting and challenge-response tests to differentiate between legitimate and malicious traffic.

Question 80

An incident handler is analyzing email headers to find out suspicious emails.

Which of the following tools he/she must use in order to accomplish the task?

Options:

A.

Barracuda Email Security Gateway

B.

Gophish

C.

SPAMfighter

Page: 20 / 20
Total 272 questions