更新されたのは2023年12月試験エンジンは212-89無料お試しサンプルが365日更新されます [Q85-Q102]

Share

更新されたのは2023年12月試験エンジンは212-89無料お試しサンプルが365日更新されます

試験合格保証212-89試験には正確な問題解答付き!


ECIH v2認定試験は、インシデント対応、応答と回復、脅威情報と分析、脆弱性評価、リスク管理など、インシデント処理に関連する広範なトピックをカバーしています。この試験は、セキュリティインシデントを特定、制御、軽減する能力やインシデント対応プロセスを管理する能力を試験するために設計されています。また、インシデント対応における最良のプラクティス(ステークホルダーとの効果的なコミュニケーション方法、インシデントの文書化方法、機密情報の完全性と機密性の維持方法)に関する知識を試験するように設計されています。

 

質問 # 85
Which of the following types of insider threats involves an insider who is uneducated on potential security threats or simply bypasses general security procedures to meet workplace efficiency?

  • A. Compromised insider
  • B. Negligent insider
  • C. Malicious insider
  • D. Professional insider

正解:B


質問 # 86
ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack.
Which of the following attacks did the attacker use?

  • A. SIowloris attack
  • B. Ping of death
  • C. SYN flood attack
  • D. UDP flood attack

正解:A


質問 # 87
Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked.
Which of the following is the current policy that Rica identified?

  • A. Permissive policy
  • B. Prudent policy
  • C. Paranoid policy
  • D. Promiscuous policy

正解:A


質問 # 88
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the
investigation, an investigator needs to process large amounts of data using a combination of automated and
manual methods. Identify the computer forensic process involved:

  • A. Analysis
  • B. Preparation
  • C. Collection
  • D. Examination

正解:D


質問 # 89
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the
worm include:

  • A. Decrease in network usage
  • B. Established connection attempts targeted at the vulnerable services
  • C. All the above
  • D. System becomes instable or crashes

正解:D


質問 # 90
Which of the following GPG 18 and Forensic readiness planning (SPF) principles states that "organizations should adopt a scenario based Forensic Readiness Planning approach that learns from experience gained within the business"?

  • A. Principle 3
  • B. Principle 7
  • C. Principle 2
  • D. Principle 5

正解:D


質問 # 91
Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

  • A. Risk avoidance
  • B. Risk assumption
  • C. Risk mitigation
  • D. Risk assessment

正解:D


質問 # 92
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could
be:

  • A. Antivirus software detects the infected files
  • B. Increase in the number of e-mails sent and received
  • C. System files become inaccessible
  • D. All the above

正解:D


質問 # 93
Raven is a part of an IH&R team and was info med by her manager to handle and lead the removal of the root cause for an incident and to close all attack vectors to prevent similar incidents in the future. Raven notifies the service providers and developers of affected resources.
Which of the following steps of the incident handling and response process does Raven need to implement to remove the root cause of the incident?

  • A. Containment
  • B. Evidence gathering and forensic analysis
  • C. Eradication
  • D. Incident triage

正解:C


質問 # 94
Alexis an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall.
Which of the following attack types did the attacker use?

  • A. AP misconfiguration
  • B. Rogue access point
  • C. Wardriving
  • D. Ad hoc associations

正解:B


質問 # 95
Clark, a professional hacker, successfully exploited the web application of a target organization by tampering the form and parameter values. In result, Clark gained access to the information assets of the organization. Identify the vulnerability in the web application exploited by the attacker.

  • A. Broken access control
  • B. SQL injection
  • C. Security misconfiguration
  • D. Sensitive data exposure

正解:B


質問 # 96
Which of the following is NOT one of the common techniques used to detect Insider threats:

  • A. Observing employee tardiness and unexplained absenteeism
  • B. Spotting an increase in their performance
  • C. Spotting conflicts with supervisors and coworkers
  • D. Observing employee sick leaves

正解:B


質問 # 97
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source.
Identify the step in which different threat sources are defined:

  • A. Threat identification
  • B. Control analysis
  • C. System characterization
  • D. Identification Vulnerabilities

正解:A


質問 # 98
The program that helps to train people to be better prepared to respond to emergency situations in their communities is known as:

  • A. Incident Response Team (IRT)
  • B. All the above
  • C. Security Incident Response Team (SIRT)
  • D. Community Emergency Response Team (CERT)

正解:D


質問 # 99
An adversary attacks the information resources to gain undue advantage is called:

  • A. Electronic Warfare
  • B. Offensive Information Warfare
  • C. Conventional Warfare
  • D. Defensive Information Warfare

正解:B


質問 # 100
Which of the following is defined as the identification of the boundaries of an IT system along with the resources and information that constitute the system?

  • A. Control analysis
  • B. Threat identification
  • C. Vulnerability identification
  • D. System characterization

正解:D


質問 # 101
Mr.Smith is a lead incident responder of a small financial enterprise, which has a few branches in Australia. Recently, the company suffered a massive attack, losing$5M through an inter-banking system After an in-depth investigation, it was found that the incident occurred because the attackers penetrated the network through a minor vulnerability 6 months ago and maintained access without being detected by any user. They then tried to delete user fingerprints and performed a lateral movement to the computer of a person with privileges in the inter-banking system. The attackers finally gained access and performed fraudulent transactions.
In the above scenario, which of the following most accurately describes the type of attack?

  • A. Phishing
  • B. Ransom ware attack
  • C. Denial-of-service attack
  • D. APT attack

正解:D


質問 # 102
......

試験問題は212-89最新版を提供するのはテストエンジン:https://www.jpntest.com/shiken/212-89-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡