Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected 212-89 ECIH Questions Answers

Page: 18 / 23
Total 305 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 69

Liam, a network engineer, configures firewalls to prevent outbound file transfers over unauthorized FTP and HTTP channels. Despite this, an insider used encrypted traffic via HTTPS to exfiltrate data. A review revealed that no deep packet inspection was in place. Which insider threat eradication control could have helped prevent this?

Options:

A.

Mandatory biometric authentication

B.

Implementing data loss prevention (DLP) tools

C.

Enforcing secure coding practices

D.

Using USB blocking software

Question 70

An organization suffers a financial loss after an executive responds to a fraudulent email crafted as part of a spear phishing attack. After isolating affected systems and notifying internal stakeholders, the incident response team prepares a detailed report outlining the attack timeline, suspicious IP addresses, email metadata, phone scam details, and the amount lost. This report is forwarded to a government agency specializing in cybercrime to aid further investigation and potential restitution. Which aspect of the recovery process is the organization addressing?

Options:

A.

Legal escalation and investigation support

B.

Data redundancy planning

C.

Endpoint protection deployment

D.

Internal server reconfiguration

Question 71

Aaron, a digital first responder, is dispatched to an R&D lab after a suspected insider data breach involving intellectual property theft. Upon entering the lab, he observes fingerprint smudges on a workstation keyboard, oily residue on a DVD near the printer, and an unplugged USB drive on the desk. He documents the position of each item, uses gloves and evidence tags, covers surfaces to prevent contamination, and restricts access to the area. Which best practice is Aaron demonstrating?

Options:

A.

Preserving trace-level physical indicators for attribution

B.

Isolating system peripherals for digital chain-of-custody

C.

Safeguarding volatile system state for RAM acquisition

D.

Capturing live session activity from open peripherals

Question 72

Matt is an incident handler working for one of the largest social network companies, which was affected by malware. According to the company’s reporting timeframe guidelines, a malware incident should be reported within 1 h of discovery/detection after its spread across the company. Which category does this incident belong to?

Options:

A.

CAT 1

B.

CAT 4

C.

CAT 2

D.

CAT 3

Page: 18 / 23
Total 305 questions