Vcehome > EC-COUNCIL > ECIH > 212-89 > 212-89 Online Practice Questions and Answers

212-89 Online Practice Questions and Answers

Questions 4

Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the risk associated with an IT system through its SDLC. How many primary steps does NIST's risk assessment methodology involve?

A. Twelve

B. Four

C. Six

D. Nine

Browse 163 Q&As
Questions 5

The sign of incident that may happen in the future is called:

A. A Precursor

B. An Indication

C. A Proactive

D. A Reactive

Browse 163 Q&As
Questions 6

Incident prioritization must be based on:

A. Potential impact

B. Current damage

C. Criticality of affected systems

D. All the above

Browse 163 Q&As
Questions 7

The left over risk after implementing a control is called:

A. Residual risk

B. Unaccepted risk

C. Low risk

D. Critical risk

Browse 163 Q&As
Questions 8

The program that helps to train people to be better prepared to respond to emergency situations in their communities is known as:

A. Community Emergency Response Team (CERT)

B. Incident Response Team (IRT)

C. Security Incident Response Team (SIRT)

D. All the above

Browse 163 Q&As
Questions 9

Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:

A. Outsider threats

B. Social Engineers

C. Insider threats

D. Zombies

Browse 163 Q&As
Questions 10

Which of the following is NOT a digital forensic analysis tool:

A. Access Data FTK

B. EAR/ Pilar

C. Guidance Software EnCase Forensic

D. Helix

Browse 163 Q&As
Questions 11

What command does a Digital Forensic Examiner use to display the list of all IP addresses and their associated MAC addresses on a victim computer to identify the machines that were communicating with it:

A. "arp" command

B. "netstat 璦n" command

C. "dd" command

D. "ifconfig" command

Browse 163 Q&As
Questions 12

Any information of probative value that is either stored or transmitted in a digital form during a computer crime is called:

A. Digital evidence

B. Computer Emails

C. Digital investigation

D. Digital Forensic Examiner

Browse 163 Q&As
Questions 13

Which test is conducted to determine the incident recovery procedures effectiveness?

A. Live walk-throughs of procedures

B. Scenario testing

C. Department-level test

D. Facility-level test

Browse 163 Q&As
Exam Code: 212-89
Exam Name: EC-Council Certified Incident Handler
Last Update: May 14, 2024
Questions: 163 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99