最近更新の2023年12月テストエンジンとPDF EC-COUNCIL 212-89テストあなたの最速EC-COUNCIL合格準備を保証させる! [Q117-Q134]

Share

最近更新の2023年12月テストエンジンとPDF EC-COUNCIL 212-89テストあなたの最速EC-COUNCIL合格準備を保証させる!

完全版212-89練習テスト205別格な問題と解釈が待ってます。今すぐゲット!

質問 # 117
The most common type(s) of intellectual property is(are):

  • A. All the above
  • B. Copyrights and Trademarks
  • C. Patents
  • D. Industrial design rights & Trade secrets

正解:A


質問 # 118
Which of the following is a characteristic of adware?

  • A. Replicating
  • B. Intimidating users
  • C. Displaying popups
  • D. Gathering information

正解:C


質問 # 119
Alexis an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall.
Which of the following attack types did the attacker use?

  • A. Rogue access point
  • B. AP misconfiguration
  • C. Wardriving
  • D. Ad hoc associations

正解:A


質問 # 120
Which of the following is the BEST method to prevent email incidents?

  • A. Installing antivirus rule updates
  • B. End-user training
  • C. Disabling HTML in email content fields
  • D. Web proxy filtering

正解:B


質問 # 121
The process of rebuilding and restoring the computer systems affected by an incident to normal operational
stage including all the processes, policies and tools is known as:

  • A. Incident Handling
  • B. Incident Management
  • C. Incident Recovery
  • D. Incident Response

正解:C

解説:
Explanation/Reference:


質問 # 122
Installing a password cracking tool, downloading pornography material, sending emails to colleagues which
irritates them and hosting unauthorized websites on the company's computer are considered:

  • A. Inappropriate usage incidents
  • B. Unauthorized access attacks
  • C. Network based attacks
  • D. Malware attacks

正解:A


質問 # 123
________________ attach(es) to files

  • A. Viruses
  • B. adware
  • C. Worms
  • D. Spyware

正解:A


質問 # 124
The individual who recovers, analyzes, and preserves computer and related materials to be presented as evidence in a court of law and identifies the evidence, estimates the potential impact of the malicious activity on the victim, and assesses the intent and identity of the perpetrator is called:

  • A. All the above
  • B. Computer Hacking Forensic Investigator
  • C. Digital Forensic Examiner
  • D. Computer Forensic Investigator

正解:A


質問 # 125
Introduction of malicious programs on to the device connected to the campus network (Trojan Horse, email bombs, virus, etc.) is called?

  • A. Network Access
  • B. Authorize Access
  • C. Inappropriate Usage
  • D. Un authorize Access

正解:A


質問 # 126
An incident handler is analyzing email headers to uncover suspicious emails.
Which of the following tools would he/she use in order to accomplish this task?

  • A. Go phish
  • B. SPAMfighter
  • C. Barracuda Email Security Gateway
  • D. Mx Toolbox

正解:D


質問 # 127
Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will maintain the information assurance (IA) and security posture of a system or site.

  • A. NIPACP
  • B. NIAAAP
  • C. NIASAP
  • D. NIACAP

正解:D


質問 # 128
If the loss anticipated is greater than the agreed upon threshold; the organization will:

  • A. Mitigate the risk
  • B. Accept the risk
  • C. Accept the risk but after management approval
  • D. Do nothing

正解:A


質問 # 129
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According to CERT's incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process improvement mechanisms?

  • A. Preparation
  • B. Detection
  • C. Protection
  • D. Triage

正解:C


質問 # 130
Patrick is performing a cyber forensic investigation. He is in the process of collect ng physical evidence at the crime scene.
Which of the following elements must he consider while collecting physical evidence?

  • A. Open ports, services, and operating system (OS) vulnerabilities
  • B. Removable media, cables, and publications
  • C. Published nameservers and web-application source code
  • D. DNS information including domains and subdomains

正解:B


質問 # 131
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident
response personnel denoted by A, B, C, D, E, F and G.

  • A. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-
    Constituency, G-Incident Coordinator
  • B. A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-
    Incident Analyst, G-Public relations
  • C. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, F-
    Constituency, G-Incident Manager
  • D. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-
    Constituency, G-Incident Manager

正解:B


質問 # 132
A malware code that infects computer files, corrupts or deletes the data in them and requires a host file to propagate is called:

  • A. Trojan
  • B. Virus
  • C. RootKit
  • D. Worm

正解:B


質問 # 133
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:

  • A. An Indication
  • B. A Reactive
  • C. A Proactive
  • D. A Precursor

正解:A


質問 # 134
......

完全版212-89練習テスト205別格な問題と解釈が待ってます。:https://www.jpntest.com/shiken/212-89-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡