Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

212-89 EC Council Certified Incident Handler (ECIH v3) Questions and Answers

Questions 4

In which of the following phases of the incident handling and response (IH&R) process is the identified security incidents analyzed, validated, categorized, and prioritized?

Options:

A.

Incident triage

B.

Incident recording and assignment

C.

Containment

D.

Notification

Buy Now
Questions 5

Jason, a cybersecurity analyst in the incident response team, begins investigating several complaints from employees who received emails urgently requesting wire transfers to an overseas account. The emails appeared to come from the company’s CEO, using a tone of authority and pressure to bypass standard procedures. Upon closer inspection, Jason identifies that the sender's email address includes a minor alteration in the domain name—a form of domain spoofing. He examines the email headers, confirms the falsified sender identity, and cross-checks with the actual CEO’s activity logs to ensure there was no internal compromise. Immediately, Jason blocks the sender’s IP address at the firewall level, alerts the finance department to prevent any unauthorized transactions, and issues a company-wide advisory about the impersonation attempt. What type of phishing is Jason handling?

Options:

A.

Whaling

B.

Mail bombing

C.

Credential stuffing

D.

Spimming

Buy Now
Questions 6

WebDynamics experienced altered webpage content due to stored Cross-Site Scripting (XSS) attacks caused by lack of output encoding. What should be the main focus to prevent this?

Options:

A.

Implement proper output encoding for displayed content.

B.

Establish a Web Application Firewall (WAF).

C.

Regularly update the CMS and plugins.

D.

Introduce mandatory two-factor authentication.

Buy Now
Questions 7

A logistics company relying heavily on cloud-based inventory management discovered unauthorized activity initiated by a third-party contractor. The investigation revealed that the contractor's login was reused across multiple departments and lacked any tracking mechanism or role-specific restrictions to limit its scope. What cloud security best practice should be implemented to prevent such violations?

Options:

A.

Enforcement of strict user access control and credential isolation

B.

Use of anonymized data during inventory analytics

C.

Routine vulnerability scans on mobile apps used by delivery teams

D.

Implementation of Secure Sockets Layer (SSL) encryption on internal systems

Buy Now
Questions 8

Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used for further investigation of the incident. In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?

Options:

A.

Containment

B.

Incident recording

C.

Incident triage

D.

Eradication

Buy Now
Questions 9

TechStream, a rising tech start-up, developed an AI-powered chatbot for its clients’ websites. Shortly after deployment, users reported receiving malicious links and phishing messages from the chatbot. Preliminary investigation traced the issue to an attacker exploiting the chatbot's AI training module. Which of the following steps would be the most efficient in addressing this vulnerability?

Options:

A.

Introducing CAPTCHA challenges before users can interact with the chatbot.

B.

Implementing strict input validation for any data fed to the chatbot.

C.

Disabling the chatbot until a complete security review is done.

D.

Limiting the chatbot’s ability to share links or external content.

Buy Now
Questions 10

In the gaming industry, Playverse Ltd. noticed that their latest game had an unauthorized “mod” that allowed players unique abilities. However, this mod was malicious, altering in-game purchases and accessing players’ financial details. Having tools like a real-time game environment scanner and a user-behavior monitor, what’s the best initial approach?

Options:

A.

Use the environment scanner to detect and remove the unauthorized mod.

B.

Push an update to disable all mods for the game.

C.

Announce the mod's risks on official channels and urge players to uninstall it.

D.

Monitor player behaviors to identify those using the mod and restrict access.

Buy Now
Questions 11

During an incident involving suspected unauthorized data access, Sophia, a system administrator, immediately isolates the affected system from the network to prevent further communication. She ensures no one tampers with the device, restricts access to the area, and notifies the incident response team. What role is Sophia performing as a first responder?

Options:

A.

Documenting the chain of custody

B.

Collecting detailed evidence logs

C.

Performing advanced forensic analysis

D.

Protecting the integrity of the crime scene

Buy Now
Questions 12

An international insurance provider observed a sharp rise in endpoint infections across geographically dispersed offices. The IR team correlated the infections with recent access to a series of trusted informational websites visited during routine research activities. After cross-referencing network telemetry and endpoint logs, analysts uncovered that these sites had been covertly altered by threat actors to include obfuscated scripts that launched on page render. Upon visiting the tampered content, a series of exploit chains were executed, targeting unpatched vulnerabilities in rendering engines of commonly used client applications. The malicious code was injected directly into volatile memory, allowing the payload to operate stealthily without initiating file creation events or prompting user interaction. Security tools failed to detect the compromise in real time due to the absence of conventional indicators such as user-triggered executions or external file transfers. Which web-based malware delivery technique is MOST consistent with the described attack?

Options:

A.

Spam email propagation using malicious file attachments disguised as legitimate documents

B.

Search engine poisoning using black hat search engine optimization

C.

Drive-by download attacks that exploit vulnerabilities

D.

Malvertising via poisoned ad banners embedded in third-party ad-serving platforms

Buy Now
Questions 13

During a security audit, analysts identified unusual GET requests to a financial application where external resources were fetched using numeric IPs combined with unexpected trailing characters. These inputs were not properly filtered by the system, allowing external content to be processed and embedded in server responses. The issue was traced to a feature that dynamically loads input-specified content without strict validation. Which type of attack/technique is most likely being analyzed in this scenario?

Options:

A.

Hidden field manipulation exploiting weak client-side validation logic.

B.

Stored cross-site scripting targeting input validation vulnerabilities.

C.

Command injection via improperly sanitized backend shell interaction.

D.

Remote file inclusion using parameter-level URL obfuscation techniques.

Buy Now
Questions 14

Ross is an incident manager (IM) at an organization, and his team provides support to all users in the organization who are affected by threats or attacks. David, who is the organization's internal auditor, is also part of Ross's incident response team. Which of the following is David's responsibility?

Options:

A.

Configure information security controls.

B.

Identify and report security loopholes to the management for necessary action.

C.

Coordinate incident containment activities with the information security officer (ISO).

D.

Perform the- necessary action to block the network traffic from the suspectoc intruder.

Buy Now
Questions 15

An organization named Sam Morison Inc. decided to use cloud-based services to reduce

the cost of maintenance. The organization identified various risks and threats

associated with cloud service adoption and migrating business-critical data to thirdparty systems. Hence, the organization decided to deploy cloud-based security tools to

prevent upcoming threats.

Which of the following tools help the organization to secure the cloud resources and

services?

Options:

A.

Nmap

B.

Burp Suite

C.

Wireshark

D.

Alert Logic

Buy Now
Questions 16

Investigator Ian gives you a drive image to investigate. What type of analysis are you performing?

Options:

A.

Real-time

B.

Static

C.

Dynamic

D.

Live

Buy Now
Questions 17

Which of the following is an Inappropriate usage incident?

Options:

A.

Access-control attack

B.

Reconnaissance attack

C.

Insider threat

D.

Denial-of-service attack

Buy Now
Questions 18

Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?

Options:

A.

Denial of service (DoS) attack

B.

Fraud and theft

C.

Unauthorized access

D.

Malicious code or insider threat attack

Buy Now
Questions 19

Post an upgrade in their global communication systems, NewsNet Corp., a media conglomerate, experienced anomalies. Subsequent analysis revealed malware that subtly altered news content, skewing information. Having an AI-based content checker and a network segregation tool, what's the immediate approach?

Options:

A.

Notify viewers about potential misinformation.

B.

Segregate affected networks, isolating the compromised systems.

C.

Use the AI checker to identify and correct skewed content.

D.

Roll back the global communication system's upgrade.

Buy Now
Questions 20

Jack, an experienced first responder in a cybersecurity incident response team, arrives at the scene of a major system breach at a financial institution. Upon arrival, Jack begins conducting preliminary interviews with key staff members who were present when the breach occurred, including network administrators, help desk personnel, and system users. He asks targeted questions about unusual system behavior, recent alerts, access logs, and any suspicious activity that may have been noticed before or during the attack. Jack takes notes to gather contextual evidence that could help reconstruct the timeline of the incident and identify potential culprits or attack vectors. Identify the responsibility assigned to Jack in the above scenario.

Options:

A.

Documenting all findings

B.

Identifying the scope of the crime scene

C.

Collecting the information about the incident

D.

Protecting the crime scene

Buy Now
Questions 21

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.

Cross-site scripting

B.

Insecure direct object references

C.

Cross-site request forgery

D.

SQL injection

Buy Now
Questions 22

An attack on a network is BEST blocked using which of the following?

Options:

A.

IPS device inline

B.

HIPS

C.

Web proxy

D.

Load balancer

Buy Now
Questions 23

Allan performed a reconnaissance attack on his corporate network as part of a red-team activity. He scanned the IP range to find live host IP addresses. What type of technique did he use to exploit the network?

Options:

A.

DNS foot printing

B.

Social engineering

C.

Port scanning

D.

Ping sweeping

Buy Now
Questions 24

Liam, a network engineer, configures firewalls to prevent outbound file transfers over unauthorized FTP and HTTP channels. Despite this, an insider used encrypted traffic via HTTPS to exfiltrate data. A review revealed that no deep packet inspection was in place. Which insider threat eradication control could have helped prevent this?

Options:

A.

Mandatory biometric authentication

B.

Implementing data loss prevention (DLP) tools

C.

Enforcing secure coding practices

D.

Using USB blocking software

Buy Now
Questions 25

Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system. These

programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.

Options:

A.

Worm

B.

Adware

C.

Virus

D.

Trojan

Buy Now
Questions 26

QualTech Solutions is a leading security services enterprise. Dickson, who works as an incident responder with this firm, is performing a vulnerability assessment to identify the security problems in the network by using automated tools for identifying the hosts, services, and vulnerabilities in the enterprise network. In the above scenario, which of the following types of vulnerability assessment is Dickson performing?

Options:

A.

Active assessment

B.

External assessment

C.

Internal assessment

D.

Passive assessment

Buy Now
Questions 27

Daniel, a SOC analyst, detects multiple incoming TCP requests to the organization’s mail server from different IPs. However, none of the requests complete the handshake. He suspects a potential attempt to exhaust server resources and confirms this with netstat logs. Which type of protocol-level incident is Daniel identifying?

Options:

A.

TCP session hijacking

B.

UDP reflection

C.

DNS cache poisoning

D.

SYN flood attack

Buy Now
Questions 28

Which of the following methods help incident responders to reduce the false-positive

alert rates and further provide benefits of focusing on topmost priority issues reducing

potential risk and corporate liabilities?

Options:

A.

Threat profiling

B.

Threat contextualization

C.

Threat correlation

D.

Threat attribution

Buy Now
Questions 29

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket submitted regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he performed incident analysis and validation to check whether the incident is a genuine incident or a false positive.

Identify the stage he is currently in.

Options:

A.

Post-incident activities

B.

Incident disclosure

C.

Incident recording and assignment

D.

Incident triage

Buy Now
Questions 30

An employee at a pharmaceutical company loses their organization-issued mobile device while attending an international conference. The device contained access to corporate email, cloud storage apps, and internal communication tools. Upon being informed, the company’s incident response team attempts to take control of the device and protect sensitive data. However, they quickly discover that no centralized management setup or security controls had been established on the device, preventing them from locking the system or removing its stored information. Which preparation step would have enabled containment in this situation?

Options:

A.

Integrate biometric login across all endpoint systems.

B.

Install custom VPN protocols for mobile web access.

C.

Deploy mobile app wrapping tools for containerized code execution.

D.

Configure remote wipe functionality for mobile assets.

Buy Now
Questions 31

Tyler, a system administrator, notices high CPU usage and unknown processes on a workstation used to download unauthorized applications. Which indicator best describes this inappropriate usage incident?

Options:

A.

Attack against an external party

B.

Unauthorized service usage

C.

Inappropriate resource usage

D.

Access to inappropriate materials

Buy Now
Questions 32

Which of the following is the BEST method to prevent email incidents?

Options:

A.

Installing antivirus rule updates

B.

Disabling HTML in email content fields

C.

Web proxy filtering

D.

End-user training

Buy Now
Questions 33

ClobalTech, an avant-garde tech giant, became victim to a massive data breach. The perpetrator was identified as an inside employee who had been with the company for over a decade. The breach unveiled sensitive client data that severely tarnished the company's reputation. ClobalTech is now revamping its security strategy. What should be its primary emphasis?

Options:

A.

Monitor and restrict internet access for employees.

B.

Rotate employees between departments every year.

C.

Mandate monthly cybersecurity training for all employees.

D.

Implement behavioral analytics to scrutinize and detect abnormal employee activities.

Buy Now
Questions 34

OmegaTech Corp identified unauthorized remote access to its primary server and data exfiltration tunnels. Simultaneously, IoT device firmware corruption was reported. As the first responder, what should Olivia prioritize?

Options:

A.

Start reinstalling IoT firmware

B.

Begin isolating the primary server and cutting off remote access

C.

Alert all divisions to initiate a system-wide shutdown

D.

Engage the AI-driven security system to trace unauthorized access

Buy Now
Questions 35

During an internal audit following a surge in unauthorized financial transactions, a multinational investment firm's IR team uncovers evidence of an orchestrated campaign targeting senior staff. The attackers had pieced together fragments of sensitive data by mining executive digital footprints, reviewing online publications, and analyzing company-related mentions on external platforms. Later, they engaged directly with employees under fabricated personas, conducting scripted interviews to extract missing identifiers. With the assembled profile data, the adversaries submitted diversion requests for financial correspondence and used these to impersonate executives and execute fraudulent transfers. Forensic analysis revealed no signs of malware infection or system-level compromise. Which technique best aligns with the adversary's method of obtaining the initial sensitive information?

Options:

A.

Phishing through spoofed emails embedded with malicious macros targeting employee laptops

B.

Social engineering using open-source intelligence followed by pretexting

C.

Pharming attack that redirected login traffic from internal systems to malicious replicas

D.

Skimming magnetic card data through modified payment devices in the company cafeteria

Buy Now
Questions 36

Stenley is an incident handler working for Texa Corp. located in the United States. With the growing concern of increasing emails from outside the organization, Stenley was

asked to take appropriate actions to keep the security of the organization intact. In the process of detecting and containing malicious emails, Stenley was asked to check the

validity of the emails received by employees.

Identify the tools he can use to accomplish the given task.

Options:

A.

PointofMail

B.

Email Dossier

C.

PoliteMail

D.

EventLog Analyzer

Buy Now
Questions 37

Attackers or insiders create a backdoor into a trusted network by installing an unsecured access point inside a firewall. They then use any software or hardware access point to perform an attack. Which of the following is this type of attack?

Options:

A.

Rogue- access point attack

B.

Password-based attack

C.

Malware attack

D.

Email infection

Buy Now
Questions 38

Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in

Florida. She was asked to work on an incident response plan. As part of the plan, she

decided to enhance and improve the security infrastructure of the enterprise. She has

incorporated a security strategy that allows security professionals to use several

protection layers throughout their information system. Due to multiple layer protection,

this security strategy assists in preventing direct attacks against the organization’s

information system as a break in one layer only leads the attacker to the next layer.

Identify the security strategy Shally has incorporated in the incident response plan.

Options:

A.

Defense-in-depth

B.

Three-way handshake

C.

Covert channels

D.

Exponential backoff algorithm

Buy Now
Questions 39

Otis is an incident handler working in Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis

was asked to take the charge and look into the matter. While auditing the enterprise security, he found the traces of an attack, where the proprietary information was stolen

from the enterprise network and was passed onto the competitors.

Which of the following information security incidents Delmont organization faced?

Options:

A.

Network and resource abuses

B.

Unauthorized access

C.

Espionage

D.

Email-based abuse

Buy Now
Questions 40

Your company sells SaaS, and your company itself is hosted in the cloud (using it as a PaaS). In case of a malware incident in your customer's database, who is responsible for eradicating the malicious software?

Options:

A.

Your company

B.

Building management

C.

The PaaS provider

D.

The customer

Buy Now
Questions 41

Ethan, an incident handler, reviews traffic logs showing abnormal connections from internal devices to high-risk external domains. He traces these back to a misconfigured IoT device using outdated firmware. What kind of indicator was key in identifying the issue?

Options:

A.

Large ICMP payloads

B.

Unauthorized ARP broadcast

C.

Suspicious outbound connections

D.

Incorrect DNS caching

Buy Now
Questions 42

Which of the following is the ECIH phase that involves removing or eliminating the root cause of an incident and closing all attack vectors to prevent similar incidents in the future?

Options:

A.

Recovery

B.

Containment

C.

Eradication

D.

Vulnerability management phase

Buy Now
Questions 43

A regional airport recently upgraded its operations with smart IoT-based baggage handling and security camera systems. During a routine cyber resilience drill mimicking device disruption, operational staff experienced confusion in executing assigned duties and lacked clarity in the communication flow. There was uncertainty about who should engage with third-party vendors, how to retrieve diagnostic logs from affected systems, and which units required priority attention to maintain continuity. Which of the following would best address these preparedness gaps?

Options:

A.

Automate alerts for anomalous activity across the IoT network using monitoring tools

B.

Schedule periodic firmware patching for vulnerable IoT endpoints

C.

Conduct realistic simulations and clearly document responsibilities for each stakeholder

D.

Transition critical airport infrastructure to a fallback manual mode during emergency events

Buy Now
Questions 44

An AWS user notices unusual activity in their EC2 instances, including unexpected outbound traffic. When suspecting a security compromise, what is the most effective immediate step to take to contain the incident?

Options:

A.

Increase logging levels and monitor traffic for anomalies.

B.

Terminate all affected EC2 instances.

C.

Reboot the affected instances to disrupt unauthorized processes.

D.

Snapshot the affected instances for forensic analysis and then isolate them using network ACLs.

Buy Now
Questions 45

A mid-sized tech company leveraging a cloud-based infrastructure noticed unauthorized interactions between cloud-hosted applications. Upon investigation, the security team discovered confusion over whether internal teams or the cloud provider were tasked with overseeing certain services, which caused delays in the incident response. Which action would best support managing this cloud security incident?

Options:

A.

Performing regular vulnerability scans on container images

B.

Assigning all incident response tasks to external cloud support teams

C.

Understanding shared responsibilities for incident response in cloud environments

D.

Disabling automatic scaling features to prevent service misuse

Buy Now
Questions 46

An incident handler is analyzing email headers to find out suspicious emails.

Which of the following tools he/she must use in order to accomplish the task?

Options:

A.

Barracuda Email Security Gateway

B.

Gophish

C.

SPAMfighter

Buy Now
Questions 47

Which of the following is NOT part of the static data collection process?

Options:

A.

Evidence oxa mi nation

B.

System preservation

C.

Password protection

D.

Evidence acquisition

Buy Now
Questions 48

Employee monitoring tools are mostly used by employers to find which of the following?

Options:

A.

Lost registry keys

B.

Conspiracies

C.

Malicious insider threats

D.

Stolen credentials

Buy Now
Questions 49

James is a professional hacker and is employed by an organization to exploit their cloud services. In order to achieve this, James created anonymous access to the cloud services to carry out various attacks such as password and key cracking, hosting malicious data, and DDoS attacks. Which of the following threats is he posing to the cloud platform?

Options:

A.

Insecure interface and APIs

B.

Data breach/loss

C.

Insufficient duo diligence

D.

Abuse end nefarious use of cloud services

Buy Now
Questions 50

A regional healthcare provider leveraging a platform-as-a-service (PaaS) cloud model detects suspicious activity involving unauthorized access to patient records. During the investigation, the incident response team attempts to retrieve system logs from virtual machines used during the breach. However, they realize that crucial log files are unavailable, as the short-lived instances were automatically terminated shortly after the event. This hampers their ability to reconstruct a complete activity trail and trace the attacker's movements. Which core cloud forensic challenge does this situation most likely reflect?

Options:

A.

Limited log access from containerized workloads.

B.

Metadata misalignment resulting from inconsistent log normalization.

C.

Evaporation of logs due to volatile storage.

D.

Log encryption hindered by poor key management practices.

Buy Now
Questions 51

Which of the following is a common tool used to help detect malicious internal or compromised actors?

Options:

A.

User behavior analytics

B.

SOC2 compliance report

C.

Log forward ng

D.

Syslog configuration

Buy Now
Questions 52

If a hacker cannot find any other way to attack an organization, they can influence an employee or a disgruntled staff member. What type of threat is this?

Options:

A.

Phishing attack

B.

Insider attack

C.

Footprinting

D.

Identity theft

Buy Now
Questions 53

WebMega, a leading e-commerce giant with over a billion users, suffered a massive data breach, compromising sensitive user data, including financials. During the containment phase, IH&R teams discovered a meticulous attack pattern that bypassed multiple security layers, hinting at an insider's involvement. Investigations revealed that three recently fired employees, with ties to a rival company, had possible motives and means. How should WebMega proceed?

Options:

A.

Reinforce security measures across the board, with a focus on employee access controls, without addressing the potential insider threat directly.

B.

Collaborate with external forensic experts and law enforcement agencies to conduct a thorough investigation while maintaining confidentiality.

C.

Reach out to the rival company's leadership, seeking an off-the-record resolution without involving legal channels.

D.

Publicly accuse the rival company of corporate espionage and initiate legal proceedings based on the initial evidence.

Buy Now
Questions 54

Khai was tasked with examining the logs from a Linux email server. The server uses Sendmail to execute the command to send emailsand Syslog to maintain logs. To validate the data within email headers, which of the following directories should Khai check for information such as source and destination IP addresses, dates, and timestamps?

Options:

A.

/Var/log/mailog

B.

/✓ar/log/sendmail

C.

/va r/log/mai11og

D.

/va r/log/sendmail/mailog

Buy Now
Questions 55

BetaCorp, a multinational corporation, identified an employee selling company secrets to competitors. BetaCorp wants to prevent such incidents in the future. Which action will be most effective?

Options:

A.

Conduct surprise bag checks at office exits.

B.

Implement an Employee Monitoring Tool to track digital activities.

C.

Regularly change office locations of employees.

D.

Introduce random polygraph tests.

Buy Now
Questions 56

Which of the following information security personnel handles incidents from management and technical point of view?

Options:

A.

Network administrators

B.

Incident manager (IM)

C.

Threat researchers

D.

Forensic investigators

Buy Now
Questions 57

Which of the following techniques prevent or mislead incident-handling process and may also affect the collection, preservation, and identification phases of the forensic

investigation process?

Options:

A.

Scanning

B.

Footprinting

C.

Enumeration

D.

Anti-forensics

Buy Now
Questions 58

GlobalCorp, a leading software development company, recently launched a cloud-based CRM application. However, within a week, customers reported unauthorized access incidents. On investigation, it was discovered that the vulnerability was due to improper session management, allowing session fixation attacks. How should GlobalCorp address this vulnerability?

Options:

A.

Implement CAPTCHA on all login pages.

B.

Rotate session tokens after successful login.

C.

Increase the complexity of user passwords.

D.

Store session IDs in encrypted cookies.

Buy Now
Questions 59

Farheen is an incident responder at reputed IT Firm based in Florida. Farheen was asked to investigate a recent cybercrime faced by the organization. As part of this process, she collected static data from a victim system. She used DD tool command to perform forensic duplication to obtain an NTFS image of the original disk. She created a sector-by-sector mirror imaging of the disk and saved the output image file as image.dd.

Identify the static data collection process step performed by Farheen while collecting static data.

Options:

A.

Comparison

B.

Administrative consideration

C.

System preservation

D.

Physical presentatio

Buy Now
Questions 60

Elena, a first responder at a multinational firm, receives multiple reports from employees claiming they were asked to update their payroll information through an email that appears to be from HR. The email includes a URL directing users to a login page identical to the company’s intranet but hosted on an unfamiliar domain. Elena immediately informs the IH&R team, preserves the email headers, captures screenshots of the spoofed page, and blocks the domain at the network level. What type of email security incident is Elena handling?

Options:

A.

DNS cache poisoning

B.

Mail storm attack

C.

Email spamming

D.

Deceptive phishing attack

Buy Now
Questions 61

Malicious Micky has moved from the delivery stage to the exploitation stage of the kill chain. This malware wants to find and report to the command center any useful services on the system. Which of the following recon attacks is the MOST LIKELY to provide this information?

Options:

A.

IP range sweep

B.

Packet sniffing

C.

Session hijack

D.

Port scan

Buy Now
Questions 62

James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.

Which of the following commands helps James in determining all the executable files for running processes?

Options:

A.

cate A &. time ,/t

B.

netstat -ab

C.

top

D.

doskey/history

Buy Now
Questions 63

Emma, a senior security engineer at a technology firm, discovered during a routine audit that several employees had been granted administrative access to sensitive systems, even though their roles did not require such access rights. One of these employees later accessed restricted financial data and attempted to modify audit logs. Which insider threat eradication measure would have best prevented this incident?

Options:

A.

User and Entity Behavior Analytics (UEBA)

B.

Principle of Least Privilege through access controls

C.

Enhanced password policy

D.

Network segmentation

Buy Now
Questions 64

SafeGuard Inc., a cloud storage company, identified attackers exploiting a Server-Side Request Forgery (SSRF) vulnerability, leading to internal network reconnaissance. Which measure should SafeGuard Inc. prioritize to mitigate this vulnerability?

Options:

A.

Disable unused application features and services.

B.

Implement a Content Security Policy (CSP).

C.

Increase monitoring and logging of application activities.

D.

Restrict outbound traffic from the application server.

Buy Now
Questions 65

A user downloaded what appears to be genuine software. Unknown to her, when she installed the application, it executed code that provided an unauthorized remote attacker access to her computer. What type of malicious threat displays this characteristic?

Options:

A.

Backdoor

B.

Trojan

C.

Spyware

D.

Virus

Buy Now
Questions 66

An IT security analyst at a logistics firm is alerted to unusual outbound traffic originating from an employee’s mobile device connected to the corporate VPN. Antivirus scans fail to remove the malware, indicating persistence. The organization cannot afford further data leakage. Which action should the incident handler take next?

Options:

A.

Disable the SIM card.

B.

Switch the device to airplane mode.

C.

Perform a factory reset or reinstall the mobile OS.

D.

Restrict background app refresh for social apps.

Buy Now
Questions 67

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

Options:

A.

Cache

B.

Disk

C.

Emails

D.

Temp files

Buy Now
Questions 68

Which of the following GPG18 and Forensic readiness planning (SPF) principles states

that “organizations should adopt a scenario based Forensic Readiness Planning

approach that learns from experience gained within the business”?

Options:

A.

Principle 3

B.

Principle 2

C.

Principle 5

D.

Principle 7

Buy Now
Questions 69

A network administrator reviews firewall and IDS/IPS configurations to ensure logging is properly set, updates logging to centralize alerts from all network devices, and confirms that all response team members know their responsibilities. Which preparatory activity is he performing?

Options:

A.

Hardening backup systems.

B.

Coordinating external law enforcement.

C.

Conducting vulnerability scanning.

D.

Ensuring network monitoring readiness.

Buy Now
Questions 70

Stanley works as an incident responder at a top MNC based in Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company. While investigating the incident, he collected evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of a jury so that the evidence clarifies the facts and further helps in obtaining an expert opinion on the incident to confirm the investigation process. In the above scenario, which of the following characteristics of the digital evidence did Stanley attempt to preserve?

Options:

A.

Completeness

B.

Admissibility

C.

Believability

D.

Authenticity

Buy Now
Questions 71

In which of the following types of insider threats an insider who is uneducated on

potential security threats or simply bypasses general security procedures to meet

workplace efficiency?

Options:

A.

Compromised insider

B.

Negligent insider

C.

Professional insider

D.

Malicious insider

Buy Now
Questions 72

In an international bank, the IT security team identified unusual network traffic indicating a potential malware infection. Further analysis revealed that several high-value transaction servers were communicating with an external command and control server. The team needs to decide the immediate action to best handle this malware incident triage. What should they prioritize to mitigate the threat and safeguard sensitive data effectively?

Options:

A.

Disconnecting the affected servers from the network to prevent further data exfiltration

B.

Initiating a controlled shutdown of the transaction servers to preserve their current state

C.

Immediately updating antivirus signatures on all network devices and servers

D.

Performing a memory dump of the affected servers for in-depth forensic analysis

Buy Now
Questions 73

Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?

Options:

A.

Malware

B.

Bolen

C.

Unvalidated redirects and forwards

D.

SQL injection

Buy Now
Questions 74

Francis is an incident handler and security expert. He works at MorisonTech Solutions based in Sydney, Australia. He was assigned a task to detect phishing/spam mails for the client organization.

Which of the following tools can assist Francis to perform the required task?

Options:

A.

Netcraft

B.

Nessus

C.

BTCrack

D.

Cain and Abel

Buy Now
Questions 75

An organization notices unusual API activity in its AWS account, suggesting unauthorized access and potential data exfiltration. What is the most critical immediate action to take to mitigate this security incident?

Options:

A.

Increase the security group's restrictions to limit access to the affected resources.

B.

Enable AWS CloudTrail logs for all regions to track future API activities.

C.

Deploy AWS Shield to protect against potential DDoS attacks as a precaution.

D.

Rotate all AWS IAM access keys and review IAM policies for excessive permissions.

Buy Now
Questions 76

After a recent cloud migration, AeroFlights, an airline company, spotted unauthorized data access. Preliminary checks hinted at malware that used cloud resources to spread, impacting flight schedules. Equipped with a cloud-specific security tool and a real-time scheduling monitor, what should be the primary action?

Options:

A.

Temporarily halt all flight operations until the issue is resolved.

B.

Deploy the cloud security tool to identify and counteract the malware.

C.

Notify passengers about possible delays and offer compensation.

D.

Monitor flight schedules in real-time to avoid potential disruptions.

Buy Now
Questions 77

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

Options:

A.

AP misconfiguration

B.

Wardriving

C.

Rogue access point

D.

Ad hoc associations

Buy Now
Questions 78

A company utilizing multiple cloud services aims to enhance its posture against cloud security incidents. Among the following options, which constitutes the best practice for achieving this goal?

Options:

A.

Regularly conduct penetration testing exclusively on critical cloud assets.

B.

Focus on physical security measures at company offices.

C.

Centralize logging and monitoring across all cloud services for improved visibility and anomaly detection.

D.

Implement a single cloud service provider strategy.

Buy Now
Questions 79

Following an internal audit at a mid-sized software development firm, it was discovered that several employees had been sharing system login credentials using personal messaging applications that were not approved by the organization. The audit further revealed that no structured guidance, awareness training, or acceptable usage policies had been provided regarding how and where confidential organizational information should be transmitted. Which of the following preparation steps would have most effectively prevented this situation?

Options:

A.

Provide awareness sessions on identifying unauthorized surveillance tools in secure areas.

B.

Schedule recurring data backups to secondary storage locations for disaster recovery.

C.

Establish defined protocols for appropriate digital channels when handling sensitive internal content.

D.

Deploy deception systems that simulate internal resources to lure potential insider threats.

Buy Now
Questions 80

Lena, a SOC analyst, observes a pattern of unusual login attempts originating from multiple foreign IP addresses tied to shared drive links circulating within the organization. These links were embedded in emails appearing to come from the HR department and marked with urgent subject lines. Upon deeper inspection, Lena finds multiple similar messages still pending in the mail server’s delivery queue. To prevent widespread exposure, she takes immediate action to eliminate these messages before they reach employees' inboxes. Which incident response action best describes Lena’s action?

Options:

A.

Preemptively purging queued phishing emails from the server

B.

Flagging login anomalies for correlation in the SIEM

C.

Initiating forensic triage on suspicious attachments

D.

Isolating compromised mailboxes from the email relay

Buy Now
Questions 81

Logan, an incident handler, ensures the chain of custody is documented while handling backup media post-attack. The goal is to preserve evidence integrity while restoring critical systems. Which recovery principle is Logan adhering to?

Options:

A.

Forensic compliance

B.

Network segmentation

C.

Immutable infrastructure

D.

Enhanced authentication

Buy Now
Questions 82

After a web application attack, HealthFirst traced the breach to an insecure Direct Object Reference (IDOR) vulnerability. They want to patch it and fortify the app. What should be their primary action?

Options:

A.

Introduce a WAF with default rules.

B.

Conduct regular penetration testing on the application.

C.

Implement role-based access controls (RBAC) for data access.

D.

Encrypt all data at rest and in transit.

Buy Now
Questions 83

Rachel, a first responder, finds a smartphone in an executive’s office that is powered ON and actively displaying a messaging app with potentially incriminating information. She avoids locking the screen or turning off the device, photographs the current display, and collects its charging cable. She then safely packages the device and ensures it is kept charged during transport. What principle is Rachel applying in her evidence handling approach?

Options:

A.

Extracting deleted messages from the cache.

B.

Preserving screen-based digital evidence.

C.

Forcing a factory reset to preserve evidence.

D.

Allowing device shutdown to save battery.

Buy Now
Questions 84

XYZ Inc. was affected by a malware attack and James, being the incident handling and

response (IH&R) team personnel handling the incident, found out that the root cause of

the incident is a backdoor that has bypassed the security perimeter due to an existing

vulnerability in the deployed firewall. James had contained the spread of the infection

and removed the malware completely. Now the organization asked him to perform

incident impact assessment to identify the impact of the incident over the organization

and he was also asked to prepare a detailed report of the incident.

Which of the following stages in IH&R process is James working on?

Options:

A.

Notification

B.

Evidence gathering and forensics analysis

C.

Post-incident activities

D.

Eradication

Buy Now
Questions 85

Zoe, a security analyst, deploys a high-interaction honeypot in the DMZ that mimics critical systems and monitors logs for scans, exploit attempts, and lateral movement techniques. What is the main purpose of Zoe’s activity?

Options:

A.

Deceiving attackers to study their behavior.

B.

Preventing malware execution using sandboxing.

C.

Blocking DDoS traffic through ACL rules.

D.

Testing the organization’s backup and recovery systems.

Buy Now
Questions 86

Andrew, an incident responder, is performing risk assessment of the client organization.

As a part of risk assessment process, he identified the boundaries of the IT systems,

along with the resources and the information that constitute the systems.

Identify the risk assessment step Andrew is performing.

Options:

A.

Control analysis

B.

System characterization

C.

Likelihood determination

D.

Control recommendations

Buy Now
Questions 87

A multinational law firm suffered a sophisticated malware attack that encrypted critical legal documents. During recovery, there is concern that some archived backups may already be compromised. Which recovery-focused action should the organization prioritize to ensure safe restoration?

Options:

A.

Perform comprehensive scans of all backup data using updated antivirus and heuristics.

B.

Deploy host-based firewalls and restrict outbound traffic.

C.

Restore services from live file shares synchronized with other offices.

D.

Wipe all endpoints completely before restoring files.

Buy Now
Questions 88

David, a certified digital first responder, arrives at the scene of a reported security breach in the HR department of a corporate office. The breach involves multiple digital endpoints, including desktop systems and mobile devices. Upon entering the scene, David observes that one desktop computer is still powered ON and logged in, showing a sensitive financial dashboard on the screen. Realizing the importance of preserving this evidence, David refrains from interacting directly with the keyboard or running applications. Instead, he takes high-resolution photographs of the screen to capture the current session details, including open applications and time-sensitive data. To avoid altering the system state, David gently moves the mouse without clicking, just enough to dismiss a screen saver without triggering any on-screen changes. He records the system’s behavior, notes any visible alerts or programs running, and tags all connected cables and peripheral ports for proper documentation. What step in the evidence handling process is David demonstrating?

Options:

A.

Seizing off-site backups

B.

Preserving volatile evidence from an active system

C.

Executing a shutdown script on Linux

D.

Handling a powered-off device

Buy Now
Questions 89

James has been appointed as an incident handling and response (IH&R) team lead and

he was assigned to build an IH&R plan along with his own team in the company.

Identify the IH&R process step James is currently working on.

Options:

A.

Eradication

B.

Recovery

C.

Preparation

D.

Notification

Buy Now
Questions 90

A social media analytics company uses a cloud-based platform to deploy and manage modular workloads. Following an alert in a background module, the incident response team began log analysis and configuration reviews. While they had access to deployment artifacts and resource usage settings, they lacked visibility into system-level activity, such as task scheduling and component runtime behavior. This information is needed to determine whether the issue originated from the underlying cloud environment. Who holds primary responsibility for providing such access in this cloud model to support the investigation?

Options:

A.

The internal DevOps team, which manages deployment processes and resource configuration.

B.

The cloud security operations team, which oversees user activity and investigates endpoint anomalies.

C.

The cloud service provider, which controls the orchestration framework and operational monitoring layers.

D.

The cloud application team, which handles business logic and data flow within modular components.

Buy Now
Questions 91

ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?

Options:

A.

Slowloris attack

B.

UDP flood attack

C.

SYN flood attack

D.

Ping of ceath

Buy Now
Exam Code: 212-89
Exam Name: EC Council Certified Incident Handler (ECIH v3)
Last Update: Feb 21, 2026
Questions: 305
212-89 pdf

212-89 PDF

$25.5  $84.99
212-89 Engine

212-89 Testing Engine

$30  $99.99
212-89 PDF + Engine

212-89 PDF + Testing Engine

$40.5  $134.99