Month End Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ECCouncil 212-89 Dumps

Page: 1 / 27
Total 272 questions

EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Question 1

Andrew, an incident responder, is performing risk assessment of the client organization.

As a part of risk assessment process, he identified the boundaries of the IT systems,

along with the resources and the information that constitute the systems.

Identify the risk assessment step Andrew is performing.

Options:

A.

Control analysis

B.

System characterization

C.

Likelihood determination

D.

Control recommendations

Question 2

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

Options:

A.

Vulnerability assessment phase

B.

Post-investigation phase

C.

Pre-investigation phase

D.

Investigation phase

Question 3

A cloud service provider’s IH&R team faces huge volumes of cloud-native logs after anomalous activity. To ensure swift and effective incident triage, what should be the primary course of action?

Options:

A.

Implement an incident response automation/orchestration tool for cloud environments to correlate logs and prioritize alerts.

B.

Immediately isolate all affected cloud instances regardless of customer impact.

C.

Notify all clients to back up data and prepare for disruptions.

D.

Focus only on cloud-native logging, ignoring third-party logging tools.

Question 4

Johnson an incident handler is working on a recent web application attack faced by the

organization. As part of this process, he performed data preprocessing in order to

analyzing and detecting the watering hole attack. He preprocessed the outbound

network traffic data collected from firewalls and proxy servers and started analyzing

the user activities within a certain time period to create time-ordered domain sequences

to perform further analysis on sequential patterns.

Identify the data-preprocessing step performed by Johnson.

Options:

A.

Filtering invalid host names

B.

Identifying unpopular domains

C.

Host name normalization

D.

User-specific sessionization

Question 5

Racheal is an incident handler working in InceptionTech organization. Recently,

numerous employees are complaining about receiving emails from unknown senders. In

order to prevent employees against spoofing emails and keeping security in mind,

Racheal was asked to take appropriate actions in this matter. As a part of her

assignment, she needs to analyze the email headers to check the authenticity of received

emails.

Which of the following protocol/authentication standards she must check in email

header to analyze the email authenticity?

Options:

A.

DKIM

B.

SNMP

C.

POP

D.

ARP

Question 6

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

Options:

A.

Cache

B.

Disk

C.

Emails

D.

Temp files

Question 7

Following an internal audit at a mid-sized software development firm, it was discovered that several employees had been sharing system login credentials using personal messaging applications that were not approved by the organization. The audit further revealed that no structured guidance, awareness training, or acceptable usage policies had been provided regarding how and where confidential organizational information should be transmitted. Which of the following preparation steps would have most effectively prevented this situation?

Options:

A.

Provide awareness sessions on identifying unauthorized surveillance tools in secure areas.

B.

Schedule recurring data backups to secondary storage locations for disaster recovery.

C.

Establish defined protocols for appropriate digital channels when handling sensitive internal content.

D.

Deploy deception systems that simulate internal resources to lure potential insider threats.

Question 8

Stenley is an incident handler working for Texa Corp. located in the United States. With the growing concern of increasing emails from outside the organization, Stenley was

asked to take appropriate actions to keep the security of the organization intact. In the process of detecting and containing malicious emails, Stenley was asked to check the

validity of the emails received by employees.

Identify the tools he can use to accomplish the given task.

Options:

A.

PointofMail

B.

Email Dossier

C.

PoliteMail

D.

EventLog Analyzer

Question 9

Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in

Florida. She was asked to work on an incident response plan. As part of the plan, she

decided to enhance and improve the security infrastructure of the enterprise. She has

incorporated a security strategy that allows security professionals to use several

protection layers throughout their information system. Due to multiple layer protection,

this security strategy assists in preventing direct attacks against the organization’s

information system as a break in one layer only leads the attacker to the next layer.

Identify the security strategy Shally has incorporated in the incident response plan.

Options:

A.

Defense-in-depth

B.

Three-way handshake

C.

Covert channels

D.

Exponential backoff algorithm

Question 10

In an online retail company, a severe security incident occurred where attackers exploited a zero-day vulnerability in the website's backend. This exploit allowed the theft of thousands of customers' credit card details. While the tech team races to patch the vulnerability, what should be the primary focus of the IH&R team?

Options:

A.

Coordinating with financial institutions to monitor suspicious transactions.

B.

Commencing legal actions against the attackers.

C.

Immediately emailing all customers advising them to cancel cards.

D.

Analyzing server logs using Incident Response Automation and Orchestration tools to understand the breach's origin.

Question 11

Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?

Options:

A.

HR log book

B.

Point of contact

C.

Email list

D.

Phone number list

Question 12

Which of the following is NOT part of the static data collection process?

Options:

A.

Evidence oxa mi nation

B.

System preservation

C.

Password protection

D.

Evidence acquisition

Question 13

Jason is setting up a computer forensics lab and must perform the following steps: 1. physical location and structural design considerations; 2. planning and budgeting; 3. work area considerations; 4. physical security recommendations; 5. forensic lab licensing; 6. human resource considerations. Arrange these steps in the order of execution.

Options:

A.

2 -> 1 -> 3 -> 6 -> 4 -> 5

B.

2->3->l ->4->6->5

C.

5-> 2-> l-> 3-> 4-> 6

D.

3 .> 2 -> 1 -> 4-> 6-> 5

Question 14

Ren is assigned to handle a security incident of an organization. He is tasked with forensics investigation to find the evidence needed by the management. Which of the following steps falls under the investigation phase of the computer forensics investigation process?

Options:

A.

Secure the evidence

B.

Risk assessment

C.

Setup a computer forensics lab

D.

Evidence assessment

Question 15

A mid-sized healthcare organization undergoing digital modernization is working toward ISO/IEC 27001 certification. During a readiness review, the CISO identifies gaps: staff lack clear channels to raise concerns about system weaknesses, outcome tracking after adverse events is inconsistent, and there is no formalized way to assess what went right or wrong following disruptions. To comply with ISO/IEC 27001 Annex A.16, which action should be prioritized?

Options:

A.

Conduct tabletop exercises to simulate insider threat scenarios.

B.

Implement a centralized SIEM dashboard for real-time alerting.

C.

Define and implement structured procedures for flaw escalation and integrating post-incident response knowledge.

D.

Deploy EDR agents across endpoints for automatic quarantine.

Question 16

Which of the following is the BEST method to prevent email incidents?

Options:

A.

Installing antivirus rule updates

B.

Disabling HTML in email content fields

C.

Web proxy filtering

D.

End-user training

Question 17

According to NITS, what are the 5 main actors in cloud computing?

Options:

A.

Provider, carrier, auditor, broker, and seller

B.

Consumer, provider, carrier, auditor, ano broker

C.

Buyer, consumer, carrier, auditor, and broker

D.

None of these

Question 18

James has been appointed as an incident handling and response (IH&R) team lead and

he was assigned to build an IH&R plan along with his own team in the company.

Identify the IH&R process step James is currently working on.

Options:

A.

Eradication

B.

Recovery

C.

Preparation

D.

Notification

Question 19

Aarav, an IT support specialist, identifies that multiple employees have engaged with an email promoting free shopping vouchers, which appears suspicious. To minimize the potential threat, he instructs staff to report the message, classify it as junk, and remove it from their inboxes. He further advises them not to interact with similar messages in the future, even if they seem to come from internal contacts. Which best practice is Aarav reinforcing?

Options:

A.

Sort emails by priority

B.

Digitally sign email attachments

C.

Disable preview pane in the inbox

D.

Avoid replying to or forwarding suspicious emails

Question 20

Raven is a part of an IH&R team and was informed by her manager to handle and lead the removal of the root cause for an incident and to close all attack vectors to prevent similar incidents in the future. Raven notifies the service providers and developers of affected resources. Which of the following steps of the incident handling and response process does Raven need to implement to remove the root cause of the incident?

Options:

A.

Evidence gathering and forensic analysis

B.

Eracicotion

C.

Containment

D.

Incident triage

Question 21

Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?

Options:

A.

Vulnerability identification

B.

Impact analysis

C.

Likelihood analysis

D.

System characterization

Question 22

Which of the following is a volatile evidence collecting tool?

Options:

A.

Netstat

B.

HashTool

C.

FTK Images

D.

ProDiscover Forensics

Question 23

The cybersecurity response team at a global enterprise receives an alert from an employee regarding a suspicious email that appears to be from a senior executive. During the investigation, the team analyzes the email header and notices that the sending IP address originates from a foreign country that has no affiliation with the organization. A WHOIS lookup confirms that the IP is registered under an unknown entity. What key element helped identify the suspicious activity?

Options:

A.

Bounce-back analysis

B.

Spam filter logs

C.

DKIM verification

D.

Originating IP trace

Question 24

TechStream, a rising tech start-up, developed an AI-powered chatbot for its clients’ websites. Shortly after deployment, users reported receiving malicious links and phishing messages from the chatbot. Preliminary investigation traced the issue to an attacker exploiting the chatbot's AI training module. Which of the following steps would be the most efficient in addressing this vulnerability?

Options:

A.

Introducing CAPTCHA challenges before users can interact with the chatbot.

B.

Implementing strict input validation for any data fed to the chatbot.

C.

Disabling the chatbot until a complete security review is done.

D.

Limiting the chatbot’s ability to share links or external content.

Question 25

An AWS user notices unusual activity in their EC2 instances, including unexpected outbound traffic. When suspecting a security compromise, what is the most effective immediate step to take to contain the incident?

Options:

A.

Increase logging levels and monitor traffic for anomalies.

B.

Terminate all affected EC2 instances.

C.

Reboot the affected instances to disrupt unauthorized processes.

D.

Snapshot the affected instances for forensic analysis and then isolate them using network ACLs.

Question 26

Rose is an incident-handling person and she is responsible for detecting and eliminating

any kind of scanning attempts over the network by any malicious threat actors. Rose

uses Wireshark tool to sniff the network and detect any malicious activities going on.

Which of the following Wireshark filters can be used by her to detect TCP Xmas scan

attempt by the attacker?

Options:

A.

tcp.dstport==7

B.

tcp.flags==0X000

C.

tcp.flags.reset==1

D.

tcp.flags==0X029

Question 27

Malicious Micky has moved from the delivery stage to the exploitation stage of the kill chain. This malware wants to find and report to the command center any useful services on the system. Which of the following recon attacks is the MOST LIKELY to provide this information?

Options:

A.

IP range sweep

B.

Packet sniffing

C.

Session hijack

D.

Port scan

Question 28

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket submitted regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he performed incident analysis and validation to check whether the incident is a genuine incident or a false positive.

Identify the stage he is currently in.

Options:

A.

Post-incident activities

B.

Incident disclosure

C.

Incident recording and assignment

D.

Incident triage

Question 29

In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?

Options:

A.

Incident recording and assignment

B.

Containment

C.

Notification

D.

Incident triage

Question 30

Rinni is an incident handler and she is performing memory dump analysis.

Which of following tools she can use in order to perform memory dump analysis?

Options:

A.

OllyDbg and IDA Pro

B.

Scylla and OllyDumpEx

C.

Procmon and ProcessExplorer

D.

iNetSim

Question 31

Following a high-profile breach investigation at a multinational corporation, an incident handler is tasked with the critical role of preserving, packaging, and transporting digital evidence from a server believed to be compromised and utilized as part of a global botnet operation. The challenge lay not only in the technical complexities of the operation but also in adhering to stringent legal and procedural frameworks to ensure the evidence remained admissible in court. Which of the following options ensures the highest level of evidence integrity during its transport?

Options:

A.

On-site encryption of the server’s data, followed by its upload to secure cloud storage.

B.

Creating a forensic image of the server's drives, verifying image hashes, storing images on encrypted drives, and maintaining detailed transport logs.

C.

Encasing the server in anti-static packaging with chain-of-custody labels.

D.

Transferring server data to a new drive using a write blocker and GPS tracking.

Question 32

Darwin is an attacker residing within the organization and is performing network

sniffing by running his system in promiscuous mode. He is capturing and viewing all

the network packets transmitted within the organization. Edwin is an incident handler

in the same organization.

In the above situation, which of the following Nmap commands Edwin must use to

detect Darwin’s system that is running in promiscuous mode?

Options:

A.

nmap -sV -T4 -O -F –version-light

B.

nmap –sU –p 500

C.

nmap --script=sniffer-detect [Target IP Address/Range of IP addresses]

D.

nmap --script hostmap

Question 33

ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?

Options:

A.

Slowloris attack

B.

UDP flood attack

C.

SYN flood attack

D.

Ping of ceath

Question 34

Daniel, a SOC analyst, detects multiple incoming TCP requests to the organization’s mail server from different IPs. However, none of the requests complete the handshake. He suspects a potential attempt to exhaust server resources and confirms this with netstat logs. Which type of protocol-level incident is Daniel identifying?

Options:

A.

TCP session hijacking

B.

UDP reflection

C.

DNS cache poisoning

D.

SYN flood attack

Question 35

Otis is an incident handler working in Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis

was asked to take the charge and look into the matter. While auditing the enterprise security, he found the traces of an attack, where the proprietary information was stolen

from the enterprise network and was passed onto the competitors.

Which of the following information security incidents Delmont organization faced?

Options:

A.

Network and resource abuses

B.

Unauthorized access

C.

Espionage

D.

Email-based abuse

Question 36

Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked. Which of the following is the current policy that Rica identified?

Options:

A.

Prudent policy

B.

Paranoic policy

C.

Permissive policy

D.

Promiscuous policy

Question 37

Khai was tasked with examining the logs from a Linux email server. The server uses Sendmail to execute the command to send emailsand Syslog to maintain logs. To validate the data within email headers, which of the following directories should Khai check for information such as source and destination IP addresses, dates, and timestamps?

Options:

A.

/Var/log/mailog

B.

/✓ar/log/sendmail

C.

/va r/log/mai11og

D.

/va r/log/sendmail/mailog

Question 38

Sameer, part of the incident response team, is alerted that several employees unknowingly entered credentials on a fake login page after receiving a spoofed internal notification. The domain name used in the attack had subtle character changes. What kind of unauthorized access incident did this attack begin with?

Options:

A.

DNS footprinting

B.

Port scanning

C.

Social engineering

D.

ARP spoofing

Question 39

DigitalSoft, a major software development firm, recently discovered unauthorized access to its codebase. The culprit was a disgruntled employee who had been overlooked for a promotion. The company wants to prevent such insider threats in the future. What is the most effective measure it can implement?

Options:

A.

Implement mandatory password changes every 30 days.

B.

Implement a strict hierarchy where only senior employees have access to sensitive data.

C.

Use biometric authentication for accessing sensitive data.

D.

Conduct regular audits of user access and use behavior analytics.

Question 40

Ross is an incident manager (IM) at an organization, and his team provides support to all users in the organization who are affected by threats or attacks. David, who is the organization's internal auditor, is also part of Ross's incident response team. Which of the following is David's responsibility?

Options:

A.

Configure information security controls.

B.

Identify and report security loopholes to the management for necessary action.

C.

Coordinate incident containment activities with the information security officer (ISO).

D.

Perform the- necessary action to block the network traffic from the suspectoc intruder.

Question 41

After unearthing malware within their AI-based prediction systems, Future Tech Corp realized that their business projections were skewed. This malware was not just altering data but was equipped with machine learning capabilities, evolving its methods. With access to a dedicated AI security module and a database restoration tool, what's the primary step?

Options:

A.

Restore the database to a point before malware infiltration.

B.

Deploy the AI-security module to counteract and remove the evolved malware.

C.

Disable the AI prediction system and rely on manual predictions temporarily.

D.

Inform business partners about potentially skewed projections.

Question 42

Logan, a network security analyst, notices a pattern of repeated ICMP echo requests being sent to a broad range of IP addresses within the company's internal subnet. To confirm his suspicion of a possible reconnaissance attempt, he opens Wireshark and starts analyzing the traffic for unusual scanning behavior. What technique is most likely being used by the attacker?

Options:

A.

DNS poisoning

B.

Ping sweep

C.

Port scanning

D.

SYN flooding

Question 43

SafeGuard Inc., a cloud storage company, identified attackers exploiting a Server-Side Request Forgery (SSRF) vulnerability, leading to internal network reconnaissance. Which measure should SafeGuard Inc. prioritize to mitigate this vulnerability?

Options:

A.

Disable unused application features and services.

B.

Implement a Content Security Policy (CSP).

C.

Increase monitoring and logging of application activities.

D.

Restrict outbound traffic from the application server.

Question 44

Chandler is a professional hacker who is targeting Technote organization. He wants to obtain important organizational information that is being transmitted between

different hierarchies. In the process, he is sniffing the data packets transmitted through the network and then analyzing them to gather packet details such as network, ports,

protocols, devices, issues in network transmission, and other network specifications. Which of the following tools Chandler must employ to perform packet analysis?

Options:

A.

BeEf

B.

IDAPro

C.

Omnipeek

D.

shARP

Question 45

Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?

Options:

A.

behaviorial analysis

B.

Physical detection

C.

Profiling

D.

Mole detection

Question 46

Which of the following are malicious software programs that infect computers and corrupt or delete the data on them?

Options:

A.

Worms

B.

Trojans

C.

Spyware

D.

Virus

Question 47

DeltaDynamics, a large-scale data analytics firm, found that one of its data scientists was sharing proprietary algorithms with external parties. The firm wishes to monitor its employees more closely without breaching privacy laws. What is the most effective measure it should consider?

Options:

A.

Use an advanced Employee Monitoring Tool that respects user privacy.

B.

Implement keystroke logging on all company devices.

C.

Install CCTV cameras in all workstations.

D.

Randomly inspect employee personal devices every week.

Question 48

Which of the following is a term that describes the combination of strategies and services intended to restore data, applications, and other resources to the public cloud or dedicated service providers?

Options:

A.

Mitigation

B.

Analysis

C.

Eradication

D.

Cloud recovery

Question 49

Otis is an incident handler working in an organization called Delmont. Recently, the organization faced several setbacks in business, whereby its revenues are decreasing. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found traces of an attack through which proprietary information was stolen from the enterprise network and passed onto their competitors. Which of the following information security incidents did Delmont face?

Options:

A.

Network and resource abuses

B.

Espionage

C.

Email-based abuse

D.

Unauthorized access

Question 50

Michael is a part of the computer incident response team of a company. One of his responsibilities is to handle email incidents. The company receives an email from an unknown source, and one of the steps that he needs to take is to check the validity of the email. Which of the following tools should he use?

Options:

A.

Zendio

B.

Email Dossier

C.

Yesware

D.

G Suite Toolbox

Question 51

Farheen is an incident responder at reputed IT Firm based in Florida. Farheen was asked to investigate a recent cybercrime faced by the organization. As part of this process, she collected static data from a victim system. She used DD tool command to perform forensic duplication to obtain an NTFS image of the original disk. She created a sector-by-sector mirror imaging of the disk and saved the output image file as image.dd.

Identify the static data collection process step performed by Farheen while collecting static data.

Options:

A.

Comparison

B.

Administrative consideration

C.

System preservation

D.

Physical presentatio

Question 52

Eric works as a system administrator in ABC organization. He granted privileged users with unlimited permissions to access the systems. These privileged users can misuse

their rights unintentionally or maliciously or attackers can trick them to perform malicious activities.

Which of the following guidelines helps incident handlers to eradicate insider attacks by privileged users?

Options:

A.

Do not use encryption methods to prevent administrators and privileged users from accessing backup tapes and sensitive information

B.

Do not control the access to administrators and privileged users

C.

Do not enable the default administrative accounts to ensure accountability

D.

Do not allow administrators to use unique accounts during the installation process

Question 53

After a recent email attack, Harry is analyzing the incident to obtain important information related to the incident. While investigating the incident, he is trying to

extract information such as sender identity, mail server, sender’s IP address, location, and so on.

Which of the following tools Harry must use to perform this task?

Options:

A.

Clamwin

B.

Logly

C.

Yesware

D.

Sharp

Question 54

Which of the following is NOT a network forensic tool?

Options:

A.

Capsa Network Analyzer

B.

Tcpdurnp

C.

Advancec NTFS Journaling Parser

D.

Wireshark

Question 55

Following a security alert, the incident response team at a legal consulting firm suspects that an employee used a USB storage device to exfiltrate confidential client data. To confirm which USB device was connected and gather timestamps and identifiers, which method is most effective?

Options:

A.

Check Windows registry entries under Enum\USB.

B.

Scan network logs for USB file upload patterns.

C.

Review Windows SetupAPI.dev.log file entries.

D.

Use WHOIS lookup to trace USB activity.

Question 56

Matt is an incident handler working for one of the largest social network companies, which was affected by malware. According to the company’s reporting timeframe guidelines, a malware incident should be reported within 1 h of discovery/detection after its spread across the company. Which category does this incident belong to?

Options:

A.

CAT 1

B.

CAT 4

C.

CAT 2

D.

CAT 3

Question 57

Which of the following is not a countermeasure to eradicate cloud security incidents?

Options:

A.

Patch the database vulnerabilities and improve the isolation mechanism

B.

Remove the malware files and traces from the affected components

C.

Check for data protection at both design and runtime

D.

Disable security options such as two factor authentication and CAPTCHA

Question 58

SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?

Options:

A.

Private key infrastructure

B.

Private key in for ma lion

C.

Public key information

D.

Public key infrastructure

Question 59

A regional healthcare provider leveraging a platform-as-a-service (PaaS) cloud model detects suspicious activity involving unauthorized access to patient records. During the investigation, the incident response team attempts to retrieve system logs from virtual machines used during the breach. However, they realize that crucial log files are unavailable, as the short-lived instances were automatically terminated shortly after the event. This hampers their ability to reconstruct a complete activity trail and trace the attacker's movements. Which core cloud forensic challenge does this situation most likely reflect?

Options:

A.

Limited log access from containerized workloads.

B.

Metadata misalignment resulting from inconsistent log normalization.

C.

Evaporation of logs due to volatile storage.

D.

Log encryption hindered by poor key management practices.

Question 60

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.

Cross-site scripting

B.

Insecure direct object references

C.

Cross-site request forgery

D.

SQL injection

Question 61

Which of the following tools helps incident responders effectively contain a potential cloud security incident and gather required forensic evidence?

Options:

A.

Alert Logic

B.

CloudPassage Quarantine

C.

Qualys Cloud Platform

D.

Cloud Passage Halo

Question 62

A national research agency was recently subjected to a comprehensive cybersecurity compliance audit. During the audit, reviewers evaluated how the agency's incident response unit manages harmful code samples during investigations. The assessment revealed that team members often interacted with dangerous file payloads directly on enterprise-connected systems used for general operations. Furthermore, no precautionary renaming was applied to prevent accidental triggering, and sensitive materials were placed in areas accessible by non-specialized personnel. The auditors flagged these practices as severely noncompliant with safe sample processing protocols and recommended urgent changes to prevent operational fallout or accidental outbreaks. Which best practice for secure handling of malicious code was most clearly disregarded in this case?

Options:

A.

Storing malware samples with non-executable file extensions in isolated environments.

B.

Encrypting all malware sample files using symmetric encryption.

C.

Create vulnerability documentation for each malware sample to support threat profiling and archival.

D.

Tagging malware sample files with platform-specific behavior indicators for improved categorization.

Question 63

EcoEarth Inc. detects abnormal archival data access from dormant employee profiles, modification of critical datasets, and suspicious encrypted packet transmissions. Given the risk, what is the first responder’s primary action?

Options:

A.

Decrypt the suspicious packets to understand the breach.

B.

Notify global ecological partners to review shared data.

C.

Initiate a rollback to a previous safe state using real-time backups.

D.

Isolate and shut down sections of the server showing abnormal activity.

Question 64

Ikeo Corp, hired an incident response team to assess the enterprise security. As part of the incident handling and response process, the IR team is reviewing the current security policies implemented by the enterprise. The IR team finds that employees of the organization do not have any restrictions on Internet access: they are allowed to visit any site, download any application, and access a computer or network from a remote location. Considering this as the main security threat, the IR team plans to change this policy as it can be easily exploited by attackers. Which of the following security policies is the IR team planning to modify?

Options:

A.

Paranoid policy

B.

Prudent policy

C.

Promiscuous policy

D.

Permissive policy

Question 65

Bran is an incident handler who is assessing the network of the organization. In the

process, he wants to detect ping sweep attempts on the network using Wireshark tool.

Which of the following Wireshark filter he must use to accomplish this task?

Options:

A.

icmp.seq

B.

icmp.redir_gw

C.

icmp.type==8

D.

icmp.ident

Question 66

An insider threat response plan helps an organization minimize the damage caused by malicious insiders. One of the approaches to mitigate these threats is setting up controls from the human resources department. Which of the following guidelines can the human resources department use?

Options:

A.

Access granted to users should be documented and vetted by a supervisor.

B.

Disable the default administrative account to ensure accountability.

C.

Implement a person-to-person rule to secure the backup process and physical media.

D.

Monitor and secure the organization's physical environment.

Question 67

David, a certified digital first responder, arrives at the scene of a reported security breach in the HR department of a corporate office. The breach involves multiple digital endpoints, including desktop systems and mobile devices. Upon entering the scene, David observes that one desktop computer is still powered ON and logged in, showing a sensitive financial dashboard on the screen. Realizing the importance of preserving this evidence, David refrains from interacting directly with the keyboard or running applications. Instead, he takes high-resolution photographs of the screen to capture the current session details, including open applications and time-sensitive data. To avoid altering the system state, David gently moves the mouse without clicking, just enough to dismiss a screen saver without triggering any on-screen changes. He records the system’s behavior, notes any visible alerts or programs running, and tags all connected cables and peripheral ports for proper documentation. What step in the evidence handling process is David demonstrating?

Options:

A.

Seizing off-site backups

B.

Preserving volatile evidence from an active system

C.

Executing a shutdown script on Linux

D.

Handling a powered-off device

Question 68

An IoT device deployed in a smart city infrastructure project begins transmitting data at an unusually high rate, signaling a potential security compromise. This device is part of a critical system that monitors traffic flow and controls street lighting, making unauthorized access or manipulation a significant concern for public safety and urban efficiency. What should be the first action taken by the smart city's incident response team to handle this IoT-based security incident effectively?

Options:

A.

Update the firmware of all IoT devices within the smart city infrastructure as a precautionary measure.

B.

Launch a city-wide campaign to raise awareness about the security risks associated with IoT devices.

C.

Immediately isolate the compromised IoT device from the network to prevent further unauthorized activity.

D.

Collaborate with the device manufacturer to investigate the cause of the unusual data transmission.

Question 69

After a recent cloud migration, AeroFlights, an airline company, spotted unauthorized data access. Preliminary checks hinted at malware that used cloud resources to spread, impacting flight schedules. Equipped with a cloud-specific security tool and a real-time scheduling monitor, what should be the primary action?

Options:

A.

Temporarily halt all flight operations until the issue is resolved.

B.

Deploy the cloud security tool to identify and counteract the malware.

C.

Notify passengers about possible delays and offer compensation.

D.

Monitor flight schedules in real-time to avoid potential disruptions.

Question 70

After a successful exploitation attempt, a university web server started exhibiting anomalies such as high server load, random form submission errors, and repeated spam complaints. Hosting providers flagged the domain as suspicious and disabled the web application. The IH&R team discovered new unknown files within the web root directory. Which action would be most appropriate to contain the incident and avoid further damage?

Options:

A.

Perform a scan to identify injection points and isolate the affected component from the network.

B.

Reconfigure form validations for improved user experience.

C.

Run a stress test to ensure hosting capacity is sufficient.

D.

Immediately re-enable the application after restoring from backup.

Question 71

In the wake of a sophisticated cyber attack at a global financial institution involving encrypted data exfiltration, an incident handler must preserve volatile memory for forensic investigation. What should be the incident handler's immediate action?

Options:

A.

Deploy forensic tools to capture volatile memory using trusted tools.

B.

Isolate the network segment and power down machines.

C.

Prioritize capturing system memory immediately, then secure the scene.

D.

Conduct preliminary documentation before any evidence preservation.

Question 72

Which of the following port scanning techniques involves resetting the TCP connection

between client and server abruptly before completion of the three-way handshake

signals, making the connection half-open?

Options:

A.

Null scan

B.

Full connect scan

C.

Stealth scan

D.

Xmas scan

Question 73

An attacker traced out and found the kind of websites a target company/individual is

frequently surfing and tested those particular websites to identify any possible

vulnerabilities. When the attacker detected vulnerabilities in the website, the attacker

started injecting malicious script/code into the web application that can redirect the

webpage and download the malware onto the victim’s machine. After infecting the

vulnerable web application, the attacker waited for the victim to access the infected web

application.

Identify the type of attack performed by the attacker.

Options:

A.

Watering hole

B.

Obfuscation application

C.

Directory traversal

D.

Cookie/Session poisoning

Question 74

An IT security analyst at a logistics firm is alerted to unusual outbound traffic originating from an employee’s mobile device connected to the corporate VPN. Antivirus scans fail to remove the malware, indicating persistence. The organization cannot afford further data leakage. Which action should the incident handler take next?

Options:

A.

Disable the SIM card.

B.

Switch the device to airplane mode.

C.

Perform a factory reset or reinstall the mobile OS.

D.

Restrict background app refresh for social apps.

Question 75

Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?

Options:

A.

Campaign attribution

B.

True attribution

C.

Nation-state attribution

D.

Intrusion set attribution

Question 76

During routine checks, EduSoft, an educational software provider, identified malware within their digital examination tools. This malware not only provided answers to students but mined personal data. With a digital forensic tool and an encryption protocol tool, what's the ideal primary action?

Options:

A.

Disable the examination tool until further notice.

B.

Alert educational institutions about the compromised software.

C.

Use the forensic tool to ascertain the malware's source and method of operation.

D.

Deploy the encryption tool to safeguard students' data.

Question 77

Attackers or insiders create a backdoor into a trusted network by installing an unsecured access point inside a firewall. They then use any software or hardware access point to perform an attack. Which of the following is this type of attack?

Options:

A.

Rogue- access point attack

B.

Password-based attack

C.

Malware attack

D.

Email infection

Question 78

Which of the following has been used to evade IDS and IPS?

Options:

A.

Fragmentation

B.

TNP

C.

HTTP

D.

SNMP

Question 79

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

Options:

A.

Risk assessment

B.

Risk assumption

C.

Risk mitigation

D.

Risk avoidance

Question 80

For analyzing the system, the browser data can be used to access various credentials.

Which of the following tools is used to analyze the history data files in Microsoft Edge browser?

Options:

A.

ChromeHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

MZHistoryView

Question 81

Post an upgrade in their global communication systems, NewsNet Corp., a media conglomerate, experienced anomalies. Subsequent analysis revealed malware that subtly altered news content, skewing information. Having an AI-based content checker and a network segregation tool, what's the immediate approach?

Options:

A.

Notify viewers about potential misinformation.

B.

Segregate affected networks, isolating the compromised systems.

C.

Use the AI checker to identify and correct skewed content.

D.

Roll back the global communication system's upgrade.

Page: 1 / 27
Total 272 questions