DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. EC-COUNCIL
  3. EC Council Certified Incident Handler (ECIH v3)
  4. EC-COUNCIL.212-89.v2023-04-10.q148
  5. Question 1

Join the discussion

Question 1/148

The Malicious code that is installed on the computer without user's knowledge to acquire information from the user's machine and send it to the attacker who can access it remotely is called:

Correct Answer: C

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (148q)
Q1. The Malicious code that is installed on the computer without user's knowledge to acquire i...
Q2. A self-replicating malicious code that does not alter files but resides in active memory a...
Q3. The product of intellect that has commercial value and includes copyrights and trademarks ...
Q4. Which of the following terms refers to the personnel that the incident handling and respon...
Q5. A methodical series of techniques and procedures for gathering evidence, from computing eq...
Q6. Which of the following email security tools can be used by an incident handler to prevent ...
Q7. An audit trail policy collects all audit trails such as series of records of computer even...
Q8. ________________ attach(es) to files
Q9. A user downloaded what appears to be genuine software. Unknown to her, when she installed ...
Q10. Rossi san incident manager (IM) and his team provides support to all users in the organiza...
Q11. The USB tool (depicted below) that is connected to male USB Keyboard cable and not detecte...
Q12. Installing a password cracking tool, downloading pornography material, sending emails to c...
Q13. Which of the following incidents are reported under CAT -5 federal agency category?...
Q14. According to US-CERT; if an agency is unable to successfully mitigate a DOS attack it must...
Q15. Incident may be reported using/ by:
Q16. Which of the following confidentiality attacks do attackers try to lure users by posing th...
Q17. A malicious security-breaking code that is disguised as any useful program that installs a...
Q18. Which of the following types of digital evidence is temporarily stored in a digital device...
Q19. Computer forensics is methodical series of techniques and procedures for gathering evidenc...
Q20. Which of the following processes is referred to as an approach to respond to the security ...
Q21. Computer viruses are malicious software programs that infect computers and corrupt or dele...
Q22. In which of the following stages of the incident handling and response (IH&R) process ...
Q23. Incident handling and response steps help you to detect, identify, respond and manage an i...
Q24. Jason is an incident handler dealing with malware incidents. He was asked to perform a mem...
Q25. After malware is removed from a system and a clean scan is returned, which of the followin...
Q26. Business Continuity provides a planning methodology that allows continuity in business ope...
Q27. Oscar receives an email from an unknown source containing his domain name oscar.com. Upon ...
Q28. ADAM, an employee from a multinational company, uses his company's accounts to send e-mail...
Q29. The message that is received and requires an urgent action and it prompts the recipient to...
Q30. Jacobi san employee in Dolphin Investment firm. While he was on his duty, he identified th...
Q31. Which of the following is the ECIH phase that involves removing or eliminating the root ca...
Q32. Deleting malicious code and disabling breached user accounts are examples of which of the ...
Q33. Alexis is working as an incident responder in XYZ organization. She was asked to identify ...
Q34. An organization faced an information security incident where a disgruntled employee passed...
Q35. Alexa downloaded a movie file. However, upon execution, it unleashed a dangerous program t...
Q36. Preventing the incident from spreading and limiting the scope of the incident is known as:...
Q37. The person who offers his formal opinion as a testimony about a computer crime incident in...
Q38. Digital evidence must:
Q39. Alexis an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible ins...
Q40. A Malicious code attack using emails is considered as:...
Q41. Tibs on works as an incident responder for MNC based in Singapore. He is investigating a w...
Q42. Introduction of malicious programs on to the device connected to the campus network (Troja...
Q43. What is correct about Quantitative Risk Analysis:...
Q44. The service organization that provides 24x7 computer security incident response services t...
Q45. Which among the following CERTs is an Internet provider to higher education institutions a...
Q46. Computer Forensics is the branch of forensic science in which legal evidence is found in a...
Q47. A computer forensic investigator must perform a proper investigation to protect digital ev...
Q48. Joseph is an incident handling and response (IH&R) team lead in Toro Network Solutions...
Q49. Business Continuity planning includes other plans such as:...
Q50. An attacker after performing an attack decided to wipe evidence using artifact wiping tech...
Q51. Eve is an incident handler in ABC organization. One day, she got a complaint about an emai...
Q52. Which of the following is an incident tracking, reporting and handling tool:...
Q53. An attack on a network is BEST blocked using which of the following?...
Q54. James has been appointed as an incident handing and response (IH&R) team lead and was ...
Q55. Insiders may be:
Q56. Which test is conducted to determine the incident recovery procedures effectiveness?...
Q57. Sam received an alert through an email monitoring tool indicating that their company was t...
Q58. The process of rebuilding and restoring the computer systems affected by an incident to no...
Q59. Farheen is an incident responder at reputed IT Firm based in Florida. Farheen was asked to...
Q60. If the browser does not expire the session when the user fails to logout properly, which o...
Q61. The data on the affected system must be backed up so that it can be retrieved if it is dam...
Q62. Authorized users with privileged access who misuse the corporate informational assets and ...
Q63. Which of the following risk management processes identifies the risks, estimates the impac...
Q64. Who is mainly responsible for providing proper network services and handling network-relat...
Q65. Contingency planning enables organizations to develop and maintain effective methods to ha...
Q66. Incident prioritization must be based on:
Q67. To effectively describe security incidents, it is necessary to adopt a common set of termi...
Q68. An incident recovery plan is a statement of actions that should be taken before, during or...
Q69. Spyware tool used to record malicious user's computer activities and keyboard stokes is ca...
Q70. Which of the following are malicious software programs that infect computers and corruptor...
Q71. In which of the following phases of the incident handling and response (IH&R) process ...
Q72. Identify the malicious program that is masked as a genuine harmless program and gives the ...
Q73. Which of the following is a correct statement about incident management, handling and resp...
Q74. Matt is an incident handler working for one of the largest social network companies, which...
Q75. Which of the following details are included in the evidence bags?...
Q76. The role that applies appropriate technology and tries to eradicate and recover from the i...
Q77. Business continuity is defined as the ability of an organization to continue to function e...
Q78. The flow chart gives a view of different roles played by the different personnel of CSIRT....
Q79. Which of the following is NOT an image integrity tool?...
Q80. The free utility which quickly scans Systems running Windows OS to find settings that may ...
Q81. Alexis an incident handler in QWERTY Company. He identified that an attacker created a bac...
Q82. Quantitative risk is the numerical determination of the probability of an adverse event an...
Q83. Michael is a part of the computer incident response team of a company. One of his responsi...
Q84. An incident handler is analyzing email headers to uncover suspicious emails. Which of the ...
Q85. As an IT security officer, what is the first step you will take after discovering a succes...
Q86. A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a...
Q87. To whom should an information security incident be reported?...
Q88. Allan performed a reconnaissance attack on his corporate network as part of a red-team act...
Q89. Elizabeth, working for OBC organization as an incident responder, is assessing the risks f...
Q90. Which of the following is an attack that occurs when a malicious program causes a user's b...
Q91. Johnson is an incident handler and is working on a recent web application attack faced by ...
Q92. Which of the following is NOT a digital forensic analysis tool:...
Q93. Which of the following is not called volatile data?...
Q94. Which one of the following is Inappropriate Usage Incidents?...
Q95. The IDS and IPS system logs indicating an unusual deviation from typical network traffic f...
Q96. To recover, analyze, and preserve computer and related materials in such a way that it can...
Q97. Which of the following is NOT a network forensic tool?...
Q98. Malicious downloads that result from malicious office documents being manipulated are caus...
Q99. Agencies do NOT report an information security incident is because of:...
Q100. You area systems administrator for a company. You are accessing your fileserver remotely f...
Q101. Richard is analyzing a corporate network. After an alert in the network's IPS, he identifi...
Q102. Dan is a newly appointed information security professional in a renowned organization. He ...
Q103. Which of the following DOES NOT expose a cloud application to hacking?...
Q104. Jason is setting up a computer forensics lab and must perform the following steps: 1. phys...
Q105. The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility stan...
Q106. Francis received a spoof email asking for his bank information. He decided to use a tool t...
Q107. Which of the following can be considered synonymous:...
Q108. Which of the following forensic investigation phases should occur first?...
Q109. While analyzing a file, Ryan discovered that an attacker used an anti-forensics method, wh...
Q110. The flow chart gives a view of different roles played by the different personnel of CSIRT....
Q111. An information security incident is
Q112. CERT members can provide critical support services to first responders such as:...
Q113. A self-replicating virus does not alter files but resides inactive memory and duplicates i...
Q114. The ability of an agency to continue to function even after a disastrous event, accomplish...
Q115. Which of the following is not a countermeasure to eradicate inappropriate usage incidents?...
Q116. The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility stan...
Q117. Drake is an incident handler at Dark Cloud Inc. Heist asked with performing log analysis i...
Q118. Which of the following risk mitigation strategies involves the execution of controls to re...
Q119. Nervous Nat often sends emails with screenshots of what he thinks are serious incidents, b...
Q120. Which of the following is a term that describes the combination of strategies and services...
Q121. Which of the following is a risk assessment tool:...
Q122. A threat source does not present a risk if NO vulnerability that can be exercised for a pa...
Q123. They type of attack that prevents the authorized users to access networks, systems, or app...
Q124. Dash wants to perform a DoS attack over 256 target URLs simultaneously. Which of the follo...
Q125. Removing or eliminating the root cause of the incident is called:...
Q126. XYZ Inc. was affected by a malware attack and James, being the incident handling and respo...
Q127. The very well-known free open source port, OS and service scanner and network discovery ut...
Q128. Which policy recommends controls for securing and tracking organizational resources:...
Q129. Which of the following might be an insider threat?...
Q130. According to NITS, what are the 5 main actors in cloud computing?...
Q131. The following steps describe the key activities in forensic readiness planning: 1. Train t...
Q132. According to the Evidence Preservation policy, a forensic investigator should make at leas...
Q133. Quantitative risk is the numerical determination of the probability of an adverse event an...
Q134. The goal of incident response is to handle the incident in a way that minimizes damage and...
Q135. Which of the following terms refers to vulnerable account management functions, including ...
Q136. An incident recovery plan is a statement of actions that should be taken before, during or...
Q137. In which of the following phases of incident handling and response (IH&R) process are ...
Q138. Clark, a professional hacker, successfully exploited the web application of a target organ...
Q139. Which of the following best describes an email issued as an attack medium, in which severa...
Q140. What command does a Digital Forensic Examiner use to display the list of all open ports an...
Q141. Which of the following GPG 18 and Forensic readiness planning (SPF) principles states that...
Q142. Which of the following is the BEST method to prevent email incidents?...
Q143. Jacobi san employee at a firm called Dolphin Investment. While he was on duty, he identifi...
Q144. Otis is an incident handler working in an organization called Delmont. Recently, the organ...
Q145. Frederick is in the eradication process in one of the incidents he is handing. Which of th...
Q146. Rica works as an incident handler for an international company. As part of her role, she m...
Q147. An organization faced an information security incident where a disgruntled employee passed...
Q148. Mr.Smith is a lead incident responder of a small financial enterprise, which has a few bra...
[×]

Download PDF File

Enter your email address to download EC-COUNCIL.212-89.v2023-04-10.q148.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.