Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

212-89 Exam Dumps - ECCouncil ECIH Questions and Answers

Question # 64

The cybersecurity response team at a global enterprise receives an alert from an employee regarding a suspicious email that appears to be from a senior executive. During the investigation, the team analyzes the email header and notices that the sending IP address originates from a foreign country that has no affiliation with the organization. A WHOIS lookup confirms that the IP is registered under an unknown entity. What key element helped identify the suspicious activity?

Options:

A.

Bounce-back analysis

B.

Spam filter logs

C.

DKIM verification

D.

Originating IP trace

Buy Now
Question # 65

In an international bank, the IT security team identified unusual network traffic indicating a potential malware infection. Further analysis revealed that several high-value transaction servers were communicating with an external command and control server. The team needs to decide the immediate action to best handle this malware incident triage. What should they prioritize to mitigate the threat and safeguard sensitive data effectively?

Options:

A.

Disconnecting the affected servers from the network to prevent further data exfiltration

B.

Initiating a controlled shutdown of the transaction servers to preserve their current state

C.

Immediately updating antivirus signatures on all network devices and servers

D.

Performing a memory dump of the affected servers for in-depth forensic analysis

Buy Now
Question # 66

Miko was hired as an incident handler in XYZ company. His first task was to identify the PING sweep attempts inside the network. For this purpose, he used Wireshark to analyze the traffic. What filter did he use to identify ICMP ping sweep attempts?

Options:

A.

tcp.typc == icmp

B.

icrrip.lype == icmp

C.

icmp.type == 8 or icmp.type ==0

D.

udp.lype — 7

Buy Now
Question # 67

An employee at a pharmaceutical company loses their organization-issued mobile device while attending an international conference. The device contained access to corporate email, cloud storage apps, and internal communication tools. Upon being informed, the company’s incident response team attempts to take control of the device and protect sensitive data. However, they quickly discover that no centralized management setup or security controls had been established on the device, preventing them from locking the system or removing its stored information. Which preparation step would have enabled containment in this situation?

Options:

A.

Integrate biometric login across all endpoint systems.

B.

Install custom VPN protocols for mobile web access.

C.

Deploy mobile app wrapping tools for containerized code execution.

D.

Configure remote wipe functionality for mobile assets.

Buy Now
Question # 68

FinTechHub, a financial tech startup, experienced a Cross-Site Scripting (XSS) attack on their main application. Post the incident the team is keen on implementing proactive measures to handle such vulnerabilities. What should be their primary focus to prevent future XSS attacks?

Options:

A.

Deploy a network-based intrusion detection system (IDS).

B.

Sanitize and validate all user inputs across the application.

C.

Regularly patch and update the server operating system.

D.

Implement rate limiting on the application.

Buy Now
Question # 69

Malicious downloads that result from malicious office documents being manipulated are caused by which of the following?

Options:

A.

Clickjacking

B.

Impersonation

C.

Registry key manipulation

D.

Macro abuse

Buy Now
Question # 70

A cybersecurity analyst at a technology firm discovers suspicious activity on a network segment dedicated to research and development. The initial indicators suggest a possible compromise of several endpoints with potential intellectual property theft. Given the sensitive nature of the data involved, what is the most effective method for the analyst to detect and validate the security incident?

Options:

A.

Immediately notify law enforcement and regulatory bodies.

B.

Isolate the affected network segment and manually inspect each endpoint.

C.

Deploy an endpoint detection and response (EDR) solution to identify and investigate suspicious activities.

D.

Conduct a network-wide vulnerability scan.

Buy Now
Question # 71

Farheen is an incident responder at reputed IT Firm based in Florida. Farheen was asked to investigate a recent cybercrime faced by the organization. As part of this process, she collected static data from a victim system. She used DD tool command to perform forensic duplication to obtain an NTFS image of the original disk. She created a sector-by-sector mirror imaging of the disk and saved the output image file as image.dd.

Identify the static data collection process step performed by Farheen while collecting static data.

Options:

A.

Comparison

B.

Administrative consideration

C.

System preservation

D.

Physical presentatio

Buy Now
Question # 72

Dash wants to perform a DoS attack over 256 target URLs simultaneously.

Which of the following tools can Dash employ to achieve his objective?

Options:

A.

HOIC

B.

IDAPro

C.

Ollydbg

D.

OpenVAS

Buy Now
Question # 73

Which of the following is an Inappropriate usage incident?

Options:

A.

Access-control attack

B.

Reconnaissance attack

C.

Insider threat

D.

Denial-of-service attack

Buy Now
Exam Code: 212-89
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Jan 23, 2026
Questions: 272
212-89 pdf

212-89 PDF

$29.75  $84.99
212-89 Engine

212-89 Testing Engine

$33.25  $94.99
212-89 PDF + Engine

212-89 PDF + Testing Engine

$47.25  $134.99