Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

212-89 Exam Dumps - ECCouncil ECIH Questions and Answers

Question # 74

Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?

Options:

A.

Campaign attribution

B.

True attribution

C.

Nation-state attribution

D.

Intrusion set attribution

Buy Now
Question # 75

The following steps describe the key activities in forensic readiness planning:

1. Train the staff to handle the incident and preserve the evidence

2. Create a special process for documenting the procedure

3. Identify the potential evidence required for an incident

4. Determine the source of the evidence

5. Establish a legal advisory board to guide the investigation process

6. Identify if the incident requires full or formal investigation

7. Establish a policy for securely handling and storing the collected evidence

8. Define a policy that determines the pathway to legally extract electronic evidence

with minimal disruption

Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.

2-->3-->1-->4-->6-->5-->7-->8

B.

3-->4-->8-->7-->6-->1-->2-->5

C.

3-->1-->4-->5-->8-->2-->6-->7

D.

1-->2-->3-->4-->5-->6-->7-->8

Buy Now
Question # 76

An organization's customers are experiencing either slower network communication or unavailability of services. In addition, network administrators are receiving alerts from security tools such as IDS/IPS and firewalls about a possible DoS/DDoS attack. In result, the organization requests the incident handling and response (IH&R) team further investigates the incident. The IH&R team decides to use manual techniques to detect DoS/DDoS attack.

Which of the following commands helps the IH&R team to manually detect DoS/DDoS attack?

Options:

A.

netstat -r

B.

nbtstat /c

C.

netstat an

D.

nbtstat/S

Buy Now
Question # 77

Johnson an incident handler is working on a recent web application attack faced by the

organization. As part of this process, he performed data preprocessing in order to

analyzing and detecting the watering hole attack. He preprocessed the outbound

network traffic data collected from firewalls and proxy servers and started analyzing

the user activities within a certain time period to create time-ordered domain sequences

to perform further analysis on sequential patterns.

Identify the data-preprocessing step performed by Johnson.

Options:

A.

Filtering invalid host names

B.

Identifying unpopular domains

C.

Host name normalization

D.

User-specific sessionization

Buy Now
Question # 78

Mason, an incident responder, detects a large volume of traffic from an internal host to external IP addresses during non-business hours. The affected host also shows signs of elevated memory and CPU consumption. AIDA64 Extreme logs confirm the system was under continuous strain for hours. What should Mason suspect as the primary issue?

Options:

A.

High resource utilization due to inappropriate usage

B.

Network misconfiguration

C.

Unauthorized hardware installation

D.

Improper access control policy

Buy Now
Question # 79

In the lead-up to a major product launch, a technology company reviews its endpoint security strategy to safeguard intellectual property. What is the most essential element to incorporate into their incident response strategy for endpoints?

Options:

A.

An employee training program focused on phishing defense

B.

A dedicated crisis management team

C.

A robust endpoint detection and response (EDR) system with automated response

D.

Comprehensive encryption strategies for data at rest and in transit

Buy Now
Question # 80

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

Options:

A.

AP misconfiguration

B.

Wardriving

C.

Rogue access point

D.

Ad hoc associations

Buy Now
Question # 81

Which of the following is not a best practice to eliminate the possibility of insider attacks?

Options:

A.

Disable the users from installing unauthorized software or accessing malicious websites using the corporate network

B.

Monitor employee behaviors and the computer systems used by employees

C.

Implement secure backup and disaster recovery processes for business continuity

D.

Always leave business details over voicemail or email broadcast message

Buy Now
Question # 82

An AWS user notices unusual activity in their EC2 instances, including unexpected outbound traffic. When suspecting a security compromise, what is the most effective immediate step to take to contain the incident?

Options:

A.

Increase logging levels and monitor traffic for anomalies.

B.

Terminate all affected EC2 instances.

C.

Reboot the affected instances to disrupt unauthorized processes.

D.

Snapshot the affected instances for forensic analysis and then isolate them using network ACLs.

Buy Now
Question # 83

EcoEarth Inc. detects abnormal archival data access from dormant employee profiles, modification of critical datasets, and suspicious encrypted packet transmissions. Given the risk, what is the first responder’s primary action?

Options:

A.

Decrypt the suspicious packets to understand the breach.

B.

Notify global ecological partners to review shared data.

C.

Initiate a rollback to a previous safe state using real-time backups.

D.

Isolate and shut down sections of the server showing abnormal activity.

Buy Now
Exam Code: 212-89
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Jan 23, 2026
Questions: 272
212-89 pdf

212-89 PDF

$29.75  $84.99
212-89 Engine

212-89 Testing Engine

$33.25  $94.99
212-89 PDF + Engine

212-89 PDF + Testing Engine

$47.25  $134.99