최신 212-89 무료덤프 - EC-COUNCIL EC Council Certified Incident Handler (ECIH v3)
Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high-profile executives of the company. What type of phishing attack is this?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is an attack that occurs when a malicious program causes a user's browser to perform an unwanted action on a trusted site for which the user is currently authenticated?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Robert is an incident handler working for Xsecurity Inc. One day, his organization faced a massive cyberattack and all the websites related to the organization went offline. Robert was on duty during the incident and he was responsible to handle the incident and maintain business continuity. He immediately restored the web application service with the help of the existing backups.
According to the scenario, which of the following stages of incident handling and response (IH&R) process does Robert performed?
According to the scenario, which of the following stages of incident handling and response (IH&R) process does Robert performed?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following information security personnel handles incidents from management and technical point of view?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Marley was asked by his incident handling and response (IH&R) team lead to collect volatile datasuch as system information and network information present in the registries, cache, and RAM of victim's system.
Identify the data acquisition method Marley must employ to collect volatile data.
Identify the data acquisition method Marley must employ to collect volatile data.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
QualTech Solutions is a leading security services enterprise. Dickson, who works as an incident responder with this firm, is performing a vulnerability assessment to identify the security problems in the network by using automated tools for identifying the hosts, services, and vulnerabilities in the enterprise network. In the above scenario, which of the following types of vulnerability assessment is Dickson performing?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is the BEST method to prevent email incidents?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Otis is an incident handler working in an organization called Delmont. Recently, the organization faced several setbacks in business, whereby its revenues are decreasing. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found traces of an attack through which proprietary information was stolen from the enterprise network and passed onto their competitors. Which of the following information security incidents did Delmont face?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)