Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

212-89 Exam Dumps - ECCouncil ECIH Questions and Answers

Question # 54

Lara, a SOC analyst, investigates multiple alerts generated by an IDS showing repeated login failures from a specific workstation to an internal application. When reviewing Windows Event Viewer logs, she discovers a user repeatedly attempting logins outside of working hours. Further checks reveal the user had installed an unauthorized remote desktop tool. Which of the following best describes this situation?

Options:

A.

Policy-enforced remote work attempt

B.

Unauthorized access incident from a third party

C.

Inappropriate usage due to policy violation and software installation

D.

DoS attack against an internal application

Buy Now
Question # 55

Which one of the following is Inappropriate Usage Incidents?

Options:

A.

Insider Threat

B.

Reconnaissance Attack

C.

Access Control Attack

D.

Denial of Service Attack

Buy Now
Question # 56

Following an internal audit at a mid-sized software development firm, it was discovered that several employees had been sharing system login credentials using personal messaging applications that were not approved by the organization. The audit further revealed that no structured guidance, awareness training, or acceptable usage policies had been provided regarding how and where confidential organizational information should be transmitted. Which of the following preparation steps would have most effectively prevented this situation?

Options:

A.

Provide awareness sessions on identifying unauthorized surveillance tools in secure areas.

B.

Schedule recurring data backups to secondary storage locations for disaster recovery.

C.

Establish defined protocols for appropriate digital channels when handling sensitive internal content.

D.

Deploy deception systems that simulate internal resources to lure potential insider threats.

Buy Now
Question # 57

James is a professional hacker and is employed by an organization to exploit their cloud services. In order to achieve this, James created anonymous access to the cloud services to carry out various attacks such as password and key cracking, hosting malicious data, and DDoS attacks. Which of the following threats is he posing to the cloud platform?

Options:

A.

Insecure interface and APIs

B.

Data breach/loss

C.

Insufficient duo diligence

D.

Abuse end nefarious use of cloud services

Buy Now
Question # 58

Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system. These

programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.

Options:

A.

Worm

B.

Adware

C.

Virus

D.

Trojan

Buy Now
Question # 59

In the wake of a sophisticated cyber attack at a global financial institution involving encrypted data exfiltration, an incident handler must preserve volatile memory for forensic investigation. What should be the incident handler's immediate action?

Options:

A.

Deploy forensic tools to capture volatile memory using trusted tools.

B.

Isolate the network segment and power down machines.

C.

Prioritize capturing system memory immediately, then secure the scene.

D.

Conduct preliminary documentation before any evidence preservation.

Buy Now
Question # 60

Tibson works as an incident responder for MNC based in Singapore. He is investigating

a web application security incident recently faced by the company. The attack is

performed on a MS SQL Server hosted by the company. In the detection and analysis

phase, he used regular expressions to analyze and detect SQL meta-characters that led

to SQL injection attack.

Identify the regular expression used by Tibson to detect SQL injection attack on MS

SQL Server.

Options:

A.

/exec(\s|\+)+(s|x)p\w+/ix

B.

((\.\.\\)|(\.\.\/))

C.

((\.|%2E)(\.|%2E)(\/|%2F|\\|%5C))

D.

((\%3C)|<)((\%2F)|\/)*(script)((\%3E)|>)

Buy Now
Question # 61

Nina, an experienced network incident responder working for a financial services firm, receives a series of high-priority alerts from Splunk Enterprise Security. The alerts are triggered by anomalous HTTP traffic patterns coming from a workstation within the internal network. Specifically, the system flagged repeated attempts to access untrusted external URLs, followed by the download of executable (.exe) files during non-business hours. Suspecting malicious activity, Nina begins investigating the web proxy logs and correlates them with endpoint detection logs. Her analysis confirms that the downloaded executables were not digitally signed and were flagged as malware by the organization's endpoint protection system shortly after execution. She also finds evidence that the malware attempted to establish outbound communication, likely for command-and-control (C2) purposes.

Nina immediately initiates containment by isolating the affected endpoint from the network. She proceeds to perform a wider investigation using system-wide and firewall logs to assess if the malware spread laterally or exfiltrated any sensitive data. What is the most likely cause of this incident?

Options:

A.

Inappropriate resource usage through malicious downloads

B.

Wi-Fi spoofing from a rogue device

C.

Malware injected through a SQL vulnerability

D.

Unauthorized privilege escalation attempt

Buy Now
Question # 62

A company utilizing multiple cloud services aims to enhance its posture against cloud security incidents. Among the following options, which constitutes the best practice for achieving this goal?

Options:

A.

Regularly conduct penetration testing exclusively on critical cloud assets.

B.

Focus on physical security measures at company offices.

C.

Centralize logging and monitoring across all cloud services for improved visibility and anomaly detection.

D.

Implement a single cloud service provider strategy.

Buy Now
Question # 63

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

Options:

A.

Risk assessment

B.

Risk assumption

C.

Risk mitigation

D.

Risk avoidance

Buy Now
Exam Code: 212-89
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Feb 24, 2026
Questions: 305
212-89 pdf

212-89 PDF

$25.5  $84.99
212-89 Engine

212-89 Testing Engine

$28.5  $94.99
212-89 PDF + Engine

212-89 PDF + Testing Engine

$40.5  $134.99