Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ECCouncil 212-89 EC Council Certified Incident Handler (ECIH v2) Exam Practice Test

Demo: 24 questions
Total 163 questions

EC Council Certified Incident Handler (ECIH v2) Questions and Answers

Question 1

Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?

Options:

A.

Scenario testing

B.

Facility testing

C.

Live walk-through testing

D.

Procedure testing

Question 2

The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:

Options:

A.

Computer Security Incident Response Team CSIRT

B.

Security Operations Center SOC

C.

Digital Forensics Examiner

D.

Vulnerability Assessor

Question 3

One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers’ security vulnerabilities and by responding effectively to potential information security incidents. Identify the incident response approach that focuses on developing the infrastructure and security processes before the occurrence or detection of an event or any incident:

Options:

A.

Interactive approach

B.

Introductive approach

C.

Proactive approach

D.

Qualitative approach

Question 4

Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infects Microsoft Word files?

Options:

A.

Micro Virus

B.

File Infector

C.

Macro Virus

D.

Boot Sector virus

Question 5

Incidents are reported in order to:

Options:

A.

Provide stronger protection for systems and data

B.

Deal properly with legal issues

C.

Be prepared for handling future incidents

D.

All the above

Question 6

An assault on system security that is derived from an intelligent threat is called:

Options:

A.

Threat Agent

B.

Vulnerability

C.

Attack

D.

Risk

Question 7

Which of the following can be considered synonymous:

Options:

A.

Hazard and Threat

B.

Threat and Threat Agent

C.

Precaution and countermeasure

D.

Vulnerability and Danger

Question 8

In a qualitative risk analysis, risk is calculated in terms of:

Options:

A.

(Attack Success + Criticality ) –(Countermeasures)

B.

Asset criticality assessment – (Risks and Associated Risk Levels)

C.

Probability of Loss X Loss

D.

(Countermeasures + Magnitude of Impact) – (Reports from prior risk assessments)

Question 9

A malware code that infects computer files, corrupts or deletes the data in them and requires a host file to propagate is called:

Options:

A.

Trojan

B.

Worm

C.

Virus

D.

RootKit

Question 10

The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:

Options:

A.

Audit trail policy

B.

Logging policy

C.

Documentation policy

D.

Evidence Collection policy

Question 11

An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the following statements is NOT true for an audit trail policy:

Options:

A.

It helps calculating intangible losses to the organization due to incident

B.

It helps tracking individual actions and allows users to be personally accountable for their actions

C.

It helps in compliance to various regulatory laws, rules,and guidelines

D.

It helps in reconstructing the events after a problem has occurred

Question 12

Incident Response Plan requires

Options:

A.

Financial and Management support

B.

Expert team composition

C.

Resources

D.

All the above

Question 13

________________ attach(es) to files

Options:

A.

adware

B.

Spyware

C.

Viruses

D.

Worms

Question 14

Spyware tool used to record malicious user’s computer activities and keyboard stokes is called:

Options:

A.

adware

B.

Keylogger

C.

Rootkit

D.

Firewall

Question 15

The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:

Options:

A.

If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.

B.

If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.

C.

If the insider’s technical literacy is high and process knowledge is low, the risk posed by the threat will be high.

D.

If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be high.

Question 16

The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy is known as:

Options:

A.

Business Continuity Plan

B.

Business Continuity

C.

Disaster Planning

D.

Contingency Planning

Question 17

The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven language, performs real-time traffic analysis and packet logging is known as:

Options:

A.

Snort

B.

Wireshark

C.

Nessus

D.

SAINT

Question 18

Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :

Options:

A.

Threat-source motivation and capability

B.

Nature of the vulnerability

C.

Existence and effectiveness of the current controls

D.

All the above

Question 19

Ensuring the integrity, confidentiality and availability of electronic protected health information of a patient is known as:

Options:

A.

Gramm-Leach-Bliley Act

B.

Health Insurance Portability and Privacy Act

C.

Social Security Act

D.

Sarbanes-Oxley Act

Question 20

ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?

Options:

A.

Inappropriate usage incident

B.

Unauthorized access incident

C.

Network intrusion incident

D.

Denial of Service incident

Question 21

An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The organization’s incident response manager, upon investigation, found that the incident must be handled within a few hours on the same day to maintain business continuity and market competitiveness. How would you categorize such information security incident?

Options:

A.

High level incident

B.

Middle level incident

C.

Ultra-High level incident

D.

Low level incident

Question 22

Business Continuity planning includes other plans such as:

Options:

A.

Incident/disaster recovery plan

B.

Business recovery and resumption plans

C.

Contingency plan

D.

All the above

Question 23

The program that helps to train people to be better prepared to respond to emergency situations in their communities is known as:

Options:

A.

Community Emergency Response Team (CERT)

B.

Incident Response Team (IRT)

C.

Security Incident Response Team (SIRT)

D.

All the above

Question 24

In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as:

Options:

A.

Asset Identification

B.

System characterization

C.

Asset valuation

D.

System classification

Demo: 24 questions
Total 163 questions