Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF 212-89 Study Guide

Page: 13 / 23
Total 305 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 49

Eric works as an incident handler at Erinol software systems. He was assigned a task to protect the organization from any kind of DoS/DDoS attacks.

Which of the following tools can be used by Eric to achieve his objective?

Options:

A.

Incapsula

B.

Hydra

C.

IDA

D.

Wireshark

Question 50

Which of the following is not a countermeasure to eradicate cloud security incidents?

Options:

A.

Patch the database vulnerabilities and improve the isolation mechanism

B.

Remove the malware files and traces from the affected components

C.

Check for data protection at both design and runtime

D.

Disable security options such as two factor authentication and CAPTCHA

Question 51

A cybersecurity analyst at a technology firm discovers suspicious activity on a network segment dedicated to research and development. The initial indicators suggest a possible compromise of several endpoints with potential intellectual property theft. Given the sensitive nature of the data involved, what is the most effective method for the analyst to detect and validate the security incident?

Options:

A.

Immediately notify law enforcement and regulatory bodies.

B.

Isolate the affected network segment and manually inspect each endpoint.

C.

Deploy an endpoint detection and response (EDR) solution to identify and investigate suspicious activities.

D.

Conduct a network-wide vulnerability scan.

Question 52

GlobalCorp, a leading software development company, recently launched a cloud-based CRM application. However, within a week, customers reported unauthorized access incidents. On investigation, it was discovered that the vulnerability was due to improper session management, allowing session fixation attacks. How should GlobalCorp address this vulnerability?

Options:

A.

Implement CAPTCHA on all login pages.

B.

Rotate session tokens after successful login.

C.

Increase the complexity of user passwords.

D.

Store session IDs in encrypted cookies.

Page: 13 / 23
Total 305 questions