Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ECCouncil > ECIH > 212-89

212-89 EC Council Certified Incident Handler (ECIH v3) Question and Answers

Question # 4

After deploying a new application on Google Cloud Platform (GCP), a security engineer discovers that an unauthorized entity has been accessing the application's backend services. Which of the following measures should the engineer take first to address this security incident?

A.

Review IAM roles and permissions for excessive access and tighten security controls.

B.

Enable Google Cloud's Security Command Center to detect future threats.

C.

Migrate the application services to a different GCP project with stronger security settings.

D.

Use VPC Service Controls to create a secure perimeter around the affected services.

Full Access
Question # 5

Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To acccomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources (processor cache) to steal data (cryptographic key/plain text secrets) from the victim machine. Identify the type of attack Alice is performing in the above scenario.

A.

Side channel attack

B.

Service hijacking

C.

SQL injection attack

D.

Man-in-the-cloud attack

Full Access
Question # 6

Which of the following is a technique used by attackers to make a message difficult to understand through the use of ambiguous language?

A.

Steganography

B.

Spoofing

C.

Encryption

D.

Obfuscation

Full Access
Question # 7

Rachel, a first responder, finds a smartphone in an executive’s office that is powered ON and actively displaying a messaging app with potentially incriminating information. She avoids locking the screen or turning off the device, photographs the current display, and collects its charging cable. She then safely packages the device and ensures it is kept charged during transport. What principle is Rachel applying in her evidence handling approach?

A.

Extracting deleted messages from the cache.

B.

Preserving screen-based digital evidence.

C.

Forcing a factory reset to preserve evidence.

D.

Allowing device shutdown to save battery.

Full Access
Question # 8

AlphaTech recently discovered signs of an advanced persistent threat (APT) in its infrastructure. The incident response team is trying to gather more information about the threat to form a comprehensive response strategy. While leveraging threat intelligence platforms, which of the following approaches would be most effective in gathering detailed and actionable insights about the APT?

A.

Searching for IOCs related to known APT campaigns and comparing them with observed patterns.

B.

Collaborating with industry peers to understand similar threats and observed TTPs.

C.

Obtaining historical data on common cyber threats to predict future movements.

D.

Gathering information from open-source forums and integrating it internally.

Full Access
Question # 9

According to NITS, what are the 5 main actors in cloud computing?

A.

Provider, carrier, auditor, broker, and seller

B.

Consumer, provider, carrier, auditor, ano broker

C.

Buyer, consumer, carrier, auditor, and broker

D.

None of these

Full Access
Question # 10

An AWS user notices unusual activity in their EC2 instances, including unexpected outbound traffic. When suspecting a security compromise, what is the most effective immediate step to take to contain the incident?

A.

Increase logging levels and monitor traffic for anomalies.

B.

Terminate all affected EC2 instances.

C.

Reboot the affected instances to disrupt unauthorized processes.

D.

Snapshot the affected instances for forensic analysis and then isolate them using network ACLs.

Full Access
Question # 11

Dash wants to perform a DoS attack over 256 target URLs simultaneously.

Which of the following tools can Dash employ to achieve his objective?

A.

HOIC

B.

IDAPro

C.

Ollydbg

D.

OpenVAS

Full Access
Question # 12

A cybersecurity analyst at a technology firm discovers suspicious activity on a network segment dedicated to research and development. The initial indicators suggest a possible compromise of several endpoints with potential intellectual property theft. Given the sensitive nature of the data involved, what is the most effective method for the analyst to detect and validate the security incident?

A.

Immediately notify law enforcement and regulatory bodies.

B.

Isolate the affected network segment and manually inspect each endpoint.

C.

Deploy an endpoint detection and response (EDR) solution to identify and investigate suspicious activities.

D.

Conduct a network-wide vulnerability scan.

Full Access
Question # 13

Michael, a digital forensic responder, enters a server room after a suspected data breach. He ensures all individuals not involved in the investigation are escorted out, avoids altering any device configurations, and isolates the server from the network without powering it down. What is the main goal of Michael's actions?

A.

Creating a chain of custody

B.

Collecting volatile memory

C.

Securing and evaluating the crime scene

D.

Cloning the affected server

Full Access
Question # 14

Rinni is an incident handler and she is performing memory dump analysis.

Which of following tools she can use in order to perform memory dump analysis?

A.

OllyDbg and IDA Pro

B.

Scylla and OllyDumpEx

C.

Procmon and ProcessExplorer

D.

iNetSim

Full Access
Question # 15

An energy company discovers unusual data transmission patterns in its IoT-based smart grid system, suggesting a potential cybersecurity incident. Given the complexity and criticality, what should be the company’s first step?

A.

Shut down the smart grid system to prevent sabotage.

B.

Update all IoT devices to the latest firmware version.

C.

Activate the incident response protocol designed for IoT systems, focusing on isolating affected devices.

D.

Engage a third-party IoT cybersecurity firm for an immediate assessment.

Full Access
Question # 16

Your company sells SaaS, and your company itself is hosted in the cloud (using it as a PaaS). In case of a malware incident in your customer's database, who is responsible for eradicating the malicious software?

A.

Your company

B.

Building management

C.

The PaaS provider

D.

The customer

Full Access
Question # 17

In which of the following types of fuzz testing strategies the new data will be generated

from scratch and the amount of data to be generated are predefined based on the

testing model?

A.

Log-based fuzz testing

B.

Generation-based fuzz testing

C.

Mutation-based fuzz testing

D.

Protocol-based fuzz testing

Full Access
Question # 18

Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high-profile executives of the company. What type of phishing attack is this?

A.

Pharming

B.

Whaling

C.

Puddle phishing

D.

Spear phishing

Full Access
Question # 19

Which of the following are malicious software programs that infect computers and corrupt or delete the data on them?

A.

Worms

B.

Trojans

C.

Spyware

D.

Virus

Full Access
Question # 20

In which of the following stages of the incident handling and response (IH&R) process do the incident handlers try to find the root cause of the incident along with the threat actors behind the incidents, threat vectors, etc.?

A.

Evidence gathering and forensics analysis

B.

Incident triage

C.

Incident recording and assignment

D.

Post-incident activities

Full Access
Question # 21

In which of the following stages of incident handling and response (IH&R) process do

the incident handlers try to find out the root cause of the incident along with the threat

actors behind the incidents, threat vectors, etc.?

A.

Post-incident activities

B.

Incident triage

C.

Evidence gathering and forensics analysis

D.

Incident recording and assignment

Full Access
Question # 22

ClobalTech, an avant-garde tech giant, became victim to a massive data breach. The perpetrator was identified as an inside employee who had been with the company for over a decade. The breach unveiled sensitive client data that severely tarnished the company's reputation. ClobalTech is now revamping its security strategy. What should be its primary emphasis?

A.

Monitor and restrict internet access for employees.

B.

Rotate employees between departments every year.

C.

Mandate monthly cybersecurity training for all employees.

D.

Implement behavioral analytics to scrutinize and detect abnormal employee activities.

Full Access
Question # 23

Identify Sarbanes–Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of

securities analysts.

A.

Title VIII: Corporate and Criminal Fraud Accountability

B.

Title V: Analyst Conflicts of Interest

C.

Title VII: Studies and Reports

D.

Title IX: White-Collar-Crime Penalty Enhancement

Full Access
Question # 24

During an internal audit following a surge in unauthorized financial transactions, a multinational investment firm's IR team uncovers evidence of an orchestrated campaign targeting senior staff. The attackers had pieced together fragments of sensitive data by mining executive digital footprints, reviewing online publications, and analyzing company-related mentions on external platforms. Later, they engaged directly with employees under fabricated personas, conducting scripted interviews to extract missing identifiers. With the assembled profile data, the adversaries submitted diversion requests for financial correspondence and used these to impersonate executives and execute fraudulent transfers. Forensic analysis revealed no signs of malware infection or system-level compromise. Which technique best aligns with the adversary's method of obtaining the initial sensitive information?

A.

Phishing through spoofed emails embedded with malicious macros targeting employee laptops

B.

Social engineering using open-source intelligence followed by pretexting

C.

Pharming attack that redirected login traffic from internal systems to malicious replicas

D.

Skimming magnetic card data through modified payment devices in the company cafeteria

Full Access
Question # 25

Patrick is doing a cyber forensic investigation. He is in the process of collecting physical

evidence at the crime scene.

Which of the following elements he must consider while collecting physical evidence?

A.

Open ports, services, and operating system (OS) vulnerabilities

B.

DNS information including domain and subdomains

C.

Published name servers and web application source code

D.

Removable media, cable, and publications

Full Access
Question # 26

Which of the following port scanning techniques involves resetting the TCP connection

between client and server abruptly before completion of the three-way handshake

signals, making the connection half-open?

A.

Null scan

B.

Full connect scan

C.

Stealth scan

D.

Xmas scan

Full Access
Question # 27

Which of the following email security tools can be used by an incident handler to

prevent the organization against evolving email threats?

A.

Email Header Analyzer

B.

G Suite Toolbox

C.

MxToolbox

D.

Gpg4win

Full Access
Question # 28

Michael is a part of the computer incident response team of a company. One of his responsibilities is to handle email incidents. The company receives an email from an unknown source, and one of the steps that he needs to take is to check the validity of the email. Which of the following tools should he use?

A.

Zendio

B.

Email Dossier

C.

Yesware

D.

G Suite Toolbox

Full Access
Question # 29

Jake, a senior incident responder in a financial institution's SOC, receives a high-severity alert from the intrusion detection system (IDS). The alert indicates a flood of SYN packets targeting the internal web server, which has now become sluggish and unresponsive to legitimate client requests. The sudden surge in half-open connections is causing resource exhaustion on the server. Suspecting a SYN flood attack—a type of denial-of-service (DoS) attack—Jake needs to verify the source and nature of the traffic to determine the appropriate containment and mitigation strategy while preserving system integrity and uptime. What step should Jake take first in response to this suspected DoS incident?

A.

Notify HR to instruct employees on mandatory password resets

B.

Disconnect all users from the network to isolate the server

C.

Inspect network traffic to confirm the attack pattern and verify source behavior

D.

Reboot the affected server to restore availability

Full Access
Question # 30

Tara, a certified first responder in a digital forensics team, is dispatched to investigate a suspected insider attack targeting a critical workstation in the finance department. Upon arriving at the scene, she takes a methodical approach: she begins labeling all connected network cables, photographs the back panel of the workstation, documents cable connections, and records the power status of each connected device, including peripherals like external drives and monitors. She also notes the orientation and placement of equipment on the desk and the surrounding environment.

These actions are part of her protocol to ensure that, if the devices need to be moved for forensic analysis, investigators can accurately replicate the system’s physical setup at the time of the incident. What is Tara aiming to achieve with these actions?

A.

Create a physical reconstruction reference

B.

Maintain the continuity of system uptime

C.

Capture device logs in real-time

D.

Execute evidence integrity hashing

Full Access
Question # 31

Alex is an incident handler in QWERTY Company. He identified that an attacker created a backdoor inside the company's network by installing a fake AP inside a firewall. Which of the following attack types did the attacker use?

A.

AP misconfiguration

B.

Wardriving

C.

Rogue access point

D.

Ad hoc associations

Full Access
Question # 32

Racheal is an incident handler working in InceptionTech organization. Recently,

numerous employees are complaining about receiving emails from unknown senders. In

order to prevent employees against spoofing emails and keeping security in mind,

Racheal was asked to take appropriate actions in this matter. As a part of her

assignment, she needs to analyze the email headers to check the authenticity of received

emails.

Which of the following protocol/authentication standards she must check in email

header to analyze the email authenticity?

A.

DKIM

B.

SNMP

C.

POP

D.

ARP

Full Access
Question # 33

In an online retail company, a severe security incident occurred where attackers exploited a zero-day vulnerability in the website's backend. This exploit allowed the theft of thousands of customers' credit card details. While the tech team races to patch the vulnerability, what should be the primary focus of the IH&R team?

A.

Coordinating with financial institutions to monitor suspicious transactions.

B.

Commencing legal actions against the attackers.

C.

Immediately emailing all customers advising them to cancel cards.

D.

Analyzing server logs using Incident Response Automation and Orchestration tools to understand the breach's origin.

Full Access
Question # 34

Which one of the following is the correct flow of the stages in an incident handling and response (IH&R) process?

A.

Preparation —* Incident recording —> Incident triage —* Containment -*■ Eradication —» Recovery —* Post-incident activities

B.

Containment —* Incident recording —* Incident triage -> Preparation —* Recovery -> Eradication -* Post-incident activities

C.

Incident recording -> Preparation -> Containment * Incident triage -> Recovery > Eradication -» Post-incident activities

D.

Incident triage —» Eradication —► Containment —* Incident recording —* Preparation —* Recovery —* Post-incident activities

Full Access
Question # 35

Bonney’s system has been compromised by a gruesome malware.

What is the primary step that is advisable to Bonney in order to contain the malware

incident from spreading?

A.

Turn off the infected machine

B.

Leave it to the network administrators to handle

C.

Complaint to police in a formal way regarding the incident

D.

Call the legal department in the organization and inform about the incident

Full Access
Question # 36

Jason is setting up a computer forensics lab and must perform the following steps: 1. physical location and structural design considerations; 2. planning and budgeting; 3. work area considerations; 4. physical security recommendations; 5. forensic lab licensing; 6. human resource considerations. Arrange these steps in the order of execution.

A.

2 -> 1 -> 3 -> 6 -> 4 -> 5

B.

2->3->l ->4->6->5

C.

5-> 2-> l-> 3-> 4-> 6

D.

3 .> 2 -> 1 -> 4-> 6-> 5

Full Access
Question # 37

Following a security alert, the incident response team at a legal consulting firm suspects that an employee used a USB storage device to exfiltrate confidential client data. To confirm which USB device was connected and gather timestamps and identifiers, which method is most effective?

A.

Check Windows registry entries under Enum\USB.

B.

Scan network logs for USB file upload patterns.

C.

Review Windows SetupAPI.dev.log file entries.

D.

Use WHOIS lookup to trace USB activity.

Full Access
Question # 38

David, an incident responder, investigates an email-based breach where the CFO's email account was compromised and used to send invoice modification requests to vendors. Logs reveal the attacker accessed the account using valid credentials after the CFO clicked on a fake Microsoft 365 login prompt sent via email. Which technique did the attacker most likely use?

A.

Mail bombing

B.

Pharming

C.

Spimming

D.

Spear phishing

Full Access
Question # 39

Which of the following details are included in the evidence bags?

A.

Error messages that contain sensitive information and files containing passworos

B.

Software version information and web application source code

C.

Sensitive cirectories, personal, and organizational email adcress

D.

Date and time of seizure, exhibit number, anc name of incident responder

Full Access
Question # 40

Which of the following risk mitigation strategies involves the execution of controls to reduce the risk factor and bring it to an acceptable level, or accepts the potential risk and continues operating the IT system?

A.

Risk avoidance

B.

Risk assumption

C.

Risk transference

D.

Risk planning

Full Access
Question # 41

An employee at a pharmaceutical company loses their organization-issued mobile device while attending an international conference. The device contained access to corporate email, cloud storage apps, and internal communication tools. Upon being informed, the company’s incident response team attempts to take control of the device and protect sensitive data. However, they quickly discover that no centralized management setup or security controls had been established on the device, preventing them from locking the system or removing its stored information. Which preparation step would have enabled containment in this situation?

A.

Integrate biometric login across all endpoint systems.

B.

Install custom VPN protocols for mobile web access.

C.

Deploy mobile app wrapping tools for containerized code execution.

D.

Configure remote wipe functionality for mobile assets.

Full Access
Question # 42

XYZ Inc. was affected by a malware attack and James, being the incident handling and

response (IH&R) team personnel handling the incident, found out that the root cause of

the incident is a backdoor that has bypassed the security perimeter due to an existing

vulnerability in the deployed firewall. James had contained the spread of the infection

and removed the malware completely. Now the organization asked him to perform

incident impact assessment to identify the impact of the incident over the organization

and he was also asked to prepare a detailed report of the incident.

Which of the following stages in IH&R process is James working on?

A.

Notification

B.

Evidence gathering and forensics analysis

C.

Post-incident activities

D.

Eradication

Full Access
Question # 43

Olivia, a cybersecurity responder at a multinational firm, is alerted late at night by the NOC team about unusual latency and degraded performance across several critical applications hosted on the company’s internal servers. Upon initial inspection, she notices that the internal routers are experiencing an unusually high volume of ARP requests being broadcast across the network. The network bandwidth utilization has spiked, and multiple routers are reporting elevated CPU usage.

As she digs deeper into the diagnostics, Olivia finds that the NAT tables on edge routers are saturated with numerous entries coming from the same IP range within a short time frame. These entries appear to be initiating simultaneous connections to different ports across various endpoints. The firewall logs also show repeated attempts to access unused services, and the ISP reports an overflow of incoming requests from various geolocations.

Based on these symptoms, what should Olivia suspect?

A.

Rogue DHCP server activity

B.

Distributed DoS attack

C.

Data exfiltration

D.

Application vulnerability scanning

Full Access
Question # 44

After noticing unusual behavior in certain employee inboxes, such as unexplained message redirection to unfamiliar external services, the IR team suspected account compromise. Despite resetting credentials and terminating active sessions, the unauthorized transfers persisted through embedded configuration anomalies. Analysts moved to eliminate lingering traces and neutralize the exploitation pathway using precision remediation techniques. Which of the following best supports the eradication effort?

A.

Auditing logs to determine when phishing emails were received

B.

Resetting compromised user credentials across all internal apps

C.

Sending advisory messages to clients about ongoing suspicious mail

D.

Deleting malicious auto-forwarding rules from affected mail clients

Full Access
Question # 45

Robert is an incident handler working for Xsecurity Inc. One day, his organization

faced a massive cyberattack and all the websites related to the organization went

offline. Robert was on duty during the incident and he was responsible to handle the

incident and maintain business continuity. He immediately restored the web application

service with the help of the existing backups.

According to the scenario, which of the following stages of incident handling and

response (IH&R) process does Robert performed?

A.

Evidence gathering and forensics analysis

B.

Eradication

C.

Notification

D.

Recovery

Full Access
Question # 46

Which of the following has been used to evade IDS and IPS?

A.

Fragmentation

B.

TNP

C.

HTTP

D.

SNMP

Full Access
Question # 47

NovoMed discovers encrypted data transfers of drug research and participant data to an unknown location and receives an extortion-like message implying the formula may be released. What is the most prudent course of action?

A.

Immediately recall the drug from the market.

B.

Publicly announce the breach warning competitors and authorities.

C.

Negotiate with the attackers discreetly to buy time and retrieve data.

D.

Engage local law enforcement and international cybercrime agencies to trace the transfer’s origins.

Full Access
Question # 48

During a routine investigation, Daniel, a threat analyst, notices repetitive failed login attempts in server logs with HTTP POST requests and status code 200 across several entries. At log entry 117, a 302 redirect status is recorded for the same user account. What type of attack is this indicative of?

A.

Dictionary attack

B.

Session hijacking

C.

SQL injection

D.

CSRF attack

Full Access
Question # 49

After containing a data compromise that disrupted operations across multiple departments, a global consulting enterprise launched a formal retrospective involving cybersecurity leads, infrastructure managers, legal advisors, and executive stakeholders. The initiative involved constructing a detailed timeline of incident-handling activities, evaluating decision pathways, identifying coordination breakdowns, and recommending actionable improvements to mitigate future occurrences. The review emphasized a no-blame culture, aiming to refine strategic playbooks and organizational readiness based on empirical evidence and shared insights. Which post-incident activity is primarily being executed in this scenario?

A.

Performing a postmortem to analyze root causes and operational effectiveness

B.

Reclassifying the event to a lower severity level based on final impact

C.

Notifying third-party vendors to begin external disclosure processes

D.

Creating an updated containment checklist based on asset inventory logs

Full Access
Question # 50

An IT security analyst at a logistics firm is alerted to unusual outbound traffic originating from an employee’s mobile device connected to the corporate VPN. Antivirus scans fail to remove the malware, indicating persistence. The organization cannot afford further data leakage. Which action should the incident handler take next?

A.

Disable the SIM card.

B.

Switch the device to airplane mode.

C.

Perform a factory reset or reinstall the mobile OS.

D.

Restrict background app refresh for social apps.

Full Access
Question # 51

Jason is an incident handler dealing with malware incidents. He was asked to perform memory dump analysis in order to collect the information about the basic functionality of any program. As a part of his assignment, he needs to perform string search analysis to search for the malicious string that could determine harmful actions that a program

can perform. Which of the following string-searching tools Jason needs to use to do the intended task?

A.

PEView

B.

BinText

C.

Dependency Walker

D.

Process Explorer

Full Access
Question # 52

Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?

A.

Denial of service (DoS) attack

B.

Fraud and theft

C.

Unauthorized access

D.

Malicious code or insider threat attack

Full Access
Question # 53

Emma, a senior security engineer at a technology firm, discovered during a routine audit that several employees had been granted administrative access to sensitive systems, even though their roles did not require such access rights. One of these employees later accessed restricted financial data and attempted to modify audit logs. Which insider threat eradication measure would have best prevented this incident?

A.

User and Entity Behavior Analytics (UEBA)

B.

Principle of Least Privilege through access controls

C.

Enhanced password policy

D.

Network segmentation

Full Access
Question # 54

Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?

A.

behaviorial analysis

B.

Physical detection

C.

Profiling

D.

Mole detection

Full Access
Question # 55

After unearthing malware within their AI-based prediction systems, Future Tech Corp realized that their business projections were skewed. This malware was not just altering data but was equipped with machine learning capabilities, evolving its methods. With access to a dedicated AI security module and a database restoration tool, what's the primary step?

A.

Restore the database to a point before malware infiltration.

B.

Deploy the AI-security module to counteract and remove the evolved malware.

C.

Disable the AI prediction system and rely on manual predictions temporarily.

D.

Inform business partners about potentially skewed projections.

Full Access
Question # 56

Marley was asked by his incident handling and response (IH&R) team lead to collect volatile data such as system information and network information present in the

registries, cache, and RAM of victim’s system.

Identify the data acquisition method Marley must employ to collect volatile data.

A.

Validate data acquisition

B.

Static data acquisition

C.

Live data acquisition

D.

Remote data acquisition

Full Access
Question # 57

In the gaming industry, Playverse Ltd. noticed that their latest game had an unauthorized “mod” that allowed players unique abilities. However, this mod was malicious, altering in-game purchases and accessing players’ financial details. Having tools like a real-time game environment scanner and a user-behavior monitor, what’s the best initial approach?

A.

Use the environment scanner to detect and remove the unauthorized mod.

B.

Push an update to disable all mods for the game.

C.

Announce the mod's risks on official channels and urge players to uninstall it.

D.

Monitor player behaviors to identify those using the mod and restrict access.

Full Access
Question # 58

Sophia, a security analyst, notices that a sensitive folder on a file server was accessed during off-hours by an intern using authorized credentials. The access was not flagged because the intern's permissions had not been reviewed in months after their project ended. What process should have been enforced to avoid this insider threat?

A.

Data classification and encryption

B.

Account lockout policies

C.

Regular auditing of user access rights

D.

Surveillance camera monitoring

Full Access
Question # 59

In which of the following types of insider threats an insider who is uneducated on

potential security threats or simply bypasses general security procedures to meet

workplace efficiency?

A.

Compromised insider

B.

Negligent insider

C.

Professional insider

D.

Malicious insider

Full Access
Question # 60

Richard is analyzing a corporate network. After an alert in the network’s IPS. he identified that all the servers are sending huge amounts of traffic to the website abc.xyz. What type of information security attack vectors have affected the network?

A.

Botnet

B.

Advance persistent three Is

C.

Ransomware

D.

IOT threats

Full Access
Question # 61

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

A.

Risk assessment

B.

Risk assumption

C.

Risk mitigation

D.

Risk avoidance

Full Access
Question # 62

Zoe, a security analyst, deploys a high-interaction honeypot in the DMZ that mimics critical systems and monitors logs for scans, exploit attempts, and lateral movement techniques. What is the main purpose of Zoe’s activity?

A.

Deceiving attackers to study their behavior.

B.

Preventing malware execution using sandboxing.

C.

Blocking DDoS traffic through ACL rules.

D.

Testing the organization’s backup and recovery systems.

Full Access
Question # 63

Sameer, part of the incident response team, is alerted that several employees unknowingly entered credentials on a fake login page after receiving a spoofed internal notification. The domain name used in the attack had subtle character changes. What kind of unauthorized access incident did this attack begin with?

A.

DNS footprinting

B.

Port scanning

C.

Social engineering

D.

ARP spoofing

Full Access
Question # 64

An organization implemented an encoding technique to eradicate SQL injection

attacks. In this technique, if a user submits a request using single-quote and some

values, then the encoding technique will convert it into numeric digits and letters

ranging from a to f. This prevents the user request from performing SQL injection

attempt on the web application.

Identify the encoding technique used by the organization.

A.

Unicode encoding

B.

Base64 encoding

C.

Hex encoding

D.

URL encoding

Full Access
Question # 65

Jacob is an employee at a firm called Dolphin Investment. While he was on duty, he identified that his computer was facing some problems, and he wanted to convey the issue to the concerned authority in his organization. However, this organization currently does not have a ticketing system to address such types of issues. In the above scenario, which of the following ticketing systems can be employed by Dolphin Investment to allow Jacob to inform the concerned team about the incident?

A.

IBM XForco Exchange

B.

ThreatConnect

C.

MISP

D.

ManageEngine ServiceDesk Plus

Full Access
Question # 66

ThetaTec, a global fintech giant, identified that an employee was siphoning off funds using a sophisticated method undetectable by traditional monitoring tools. The firm decided to employ advanced techniques to detect such hidden insider threats. What should be its primary focus?

A.

Install hidden microphones in the office to capture conversations.

B.

Use behavioral analytics to identify potential risks based on employee actions and patterns.

C.

Mandate all employees to provide access to their personal bank statements.

D.

Conduct polygraph tests on all employees quarterly.

Full Access
Question # 67

A company utilizing multiple cloud services aims to enhance its posture against cloud security incidents. Among the following options, which constitutes the best practice for achieving this goal?

A.

Regularly conduct penetration testing exclusively on critical cloud assets.

B.

Focus on physical security measures at company offices.

C.

Centralize logging and monitoring across all cloud services for improved visibility and anomaly detection.

D.

Implement a single cloud service provider strategy.

Full Access
Question # 68

Noah, a physical security officer, reviewed entry logs after a breach was reported in the data center. Surveillance showed a contract worker accessing restricted areas using another employee's badge. The access control system lacked biometric verification. Which physical security control could have best prevented this incident?

A.

Scheduled patch management

B.

Dual authentication

C.

Role-based firewall segmentation

D.

Encrypted file systems

Full Access
Question # 69

During a security audit, analysts identified unusual GET requests to a financial application where external resources were fetched using numeric IPs combined with unexpected trailing characters. These inputs were not properly filtered by the system, allowing external content to be processed and embedded in server responses. The issue was traced to a feature that dynamically loads input-specified content without strict validation. Which type of attack/technique is most likely being analyzed in this scenario?

A.

Hidden field manipulation exploiting weak client-side validation logic.

B.

Stored cross-site scripting targeting input validation vulnerabilities.

C.

Command injection via improperly sanitized backend shell interaction.

D.

Remote file inclusion using parameter-level URL obfuscation techniques.

Full Access
Question # 70

Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?

A.

HR log book

B.

Point of contact

C.

Email list

D.

Phone number list

Full Access
Question # 71

Andrew, an incident responder, is performing risk assessment of the client organization.

As a part of risk assessment process, he identified the boundaries of the IT systems,

along with the resources and the information that constitute the systems.

Identify the risk assessment step Andrew is performing.

A.

Control analysis

B.

System characterization

C.

Likelihood determination

D.

Control recommendations

Full Access
Question # 72

Aarav, an IT support specialist, identifies that multiple employees have engaged with an email promoting free shopping vouchers, which appears suspicious. To minimize the potential threat, he instructs staff to report the message, classify it as junk, and remove it from their inboxes. He further advises them not to interact with similar messages in the future, even if they seem to come from internal contacts. Which best practice is Aarav reinforcing?

A.

Sort emails by priority

B.

Digitally sign email attachments

C.

Disable preview pane in the inbox

D.

Avoid replying to or forwarding suspicious emails

Full Access
Question # 73

A cybersecurity team at a financial services firm detects abnormal behavior on several endpoints, suggesting a possible breach. The anomalies include unexpected data transfers and processes running with unusual permissions. Given the potential impact, the team needs to quickly validate whether these are indicators of a security incident or benign anomalies. What method should the team prioritize to detect and validate the incident effectively?

A.

Utilize an advanced behavioral analysis tool to differentiate between legitimate and malicious activities.

B.

Implement strict access control measures to limit permissions on all endpoints immediately.

C.

Disconnect the affected endpoints from the network to prevent potential data exfiltration.

D.

Engage an external cybersecurity consultancy to conduct an independent assessment.

Full Access
Question # 74

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

A.

Vulnerability assessment phase

B.

Post-investigation phase

C.

Pre-investigation phase

D.

Investigation phase

Full Access
Question # 75

Lena, a SOC analyst, observes a pattern of unusual login attempts originating from multiple foreign IP addresses tied to shared drive links circulating within the organization. These links were embedded in emails appearing to come from the HR department and marked with urgent subject lines. Upon deeper inspection, Lena finds multiple similar messages still pending in the mail server’s delivery queue. To prevent widespread exposure, she takes immediate action to eliminate these messages before they reach employees' inboxes. Which incident response action best describes Lena’s action?

A.

Preemptively purging queued phishing emails from the server

B.

Flagging login anomalies for correlation in the SIEM

C.

Initiating forensic triage on suspicious attachments

D.

Isolating compromised mailboxes from the email relay

Full Access
Question # 76

GlobalCorp, a leading software development company, recently launched a cloud-based CRM application. However, within a week, customers reported unauthorized access incidents. On investigation, it was discovered that the vulnerability was due to improper session management, allowing session fixation attacks. How should GlobalCorp address this vulnerability?

A.

Implement CAPTCHA on all login pages.

B.

Rotate session tokens after successful login.

C.

Increase the complexity of user passwords.

D.

Store session IDs in encrypted cookies.

Full Access
Question # 77

In which of the following confidentiality attacks attackers try to lure users by posing themselves as authorized AP by beaconing the WLAN's SSID?

A.

Evil twin AP

B.

Session hijacking

C.

Honeypot AP

D.

Masqueradin

Full Access
Question # 78

Zaimasoft, a prominent IT organization, was attacked by perpetrators who directly targeted the hardware and caused irreversible damage to the hardware. In result, replacing or reinstalling the hardware was the only solution.

Identify the type of denial-of-service attack performed on Zaimasoft.

A.

ddos

B.

DoS

C.

PDoS

D.

DRDoS

Full Access
Question # 79

The following steps describe the key activities in forensic readiness planning:

1. Train the staff to handle the incident and preserve the evidence

2. Create a special process for documenting the procedure

3. Identify the potential evidence required for an incident

4. Determine the source of the evidence

5. Establish a legal advisory board to guide the investigation process

6. Identify if the incident requires full or formal investigation

7. Establish a policy for securely handling and storing the collected evidence

8. Define a policy that determines the pathway to legally extract electronic evidence

with minimal disruption

Identify the correct sequence of steps involved in forensic readiness planning.

A.

2-->3-->1-->4-->6-->5-->7-->8

B.

3-->4-->8-->7-->6-->1-->2-->5

C.

3-->1-->4-->5-->8-->2-->6-->7

D.

1-->2-->3-->4-->5-->6-->7-->8

Full Access
Question # 80

MegaHealth, a global healthcare provider, experienced a sudden malfunction in its MRI machines. Investigations revealed malware that tweaked MRI results and communicated with an external command-and-control server. With tools like an advanced endpoint protection system and a network monitor, what should be the first step?

A.

Inform the patients about a potential compromise of their data.

B.

Use the network monitor to identify and block the C&C server communication.

C.

Update the MRI machines' firmware and software.

D.

Deploy the endpoint protection on MRI machines to detect and halt the malware.

Full Access
Question # 81

Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?

A.

Campaign attribution

B.

True attribution

C.

Nation-state attribution

D.

Intrusion set attribution

Full Access
Question # 82

A large healthcare provider with an extensive network of endpoints experiences a significant ransomware attack encrypting critical patient data. What underscores the importance of an effective endpoint security incident handling and response framework in this context?

A.

The necessity of maintaining operational continuity in healthcare services to ensure patient care.

B.

The requirement to report the incident to regulatory bodies within a specified timeframe.

C.

The need to overhaul the entire IT infrastructure post-incident.

D.

The potential for reputational damage exceeding financial costs.

Full Access
Question # 83

Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked. Which of the following is the current policy that Rica identified?

A.

Prudent policy

B.

Paranoic policy

C.

Permissive policy

D.

Promiscuous policy

Full Access
Question # 84

Adam is an incident handler who intends to use DBCC LOG command to analyze a database and retrieve the active transaction log files for the specified database. The syntax of DBCC LOG command is DBCC LOG(, ), where the output parameter specifies the level of information an incident handler wants to retrieve. If Adam wants to retrieve the full information on each operation along with the hex dump of a current transaction row, which of the following output parameters should Adam use?

A.

2

B.

3

C.

4

D.

1

Full Access
Question # 85

After a web application attack, HealthFirst traced the breach to an insecure Direct Object Reference (IDOR) vulnerability. They want to patch it and fortify the app. What should be their primary action?

A.

Introduce a WAF with default rules.

B.

Conduct regular penetration testing on the application.

C.

Implement role-based access controls (RBAC) for data access.

D.

Encrypt all data at rest and in transit.

Full Access
Question # 86

Which of the following does NOT reduce the success rate of SQL injection?

A.

Close unnecessary application services and ports on the server.

B.

Automatically lock a user account after a predefined number of invalid login attempts within a predefined interval.

C.

Constrain legitimate characters to exclude special characters.

D.

Limit the length of the input field.

Full Access
Question # 87

Jason, a cybersecurity analyst in the incident response team, begins investigating several complaints from employees who received emails urgently requesting wire transfers to an overseas account. The emails appeared to come from the company’s CEO, using a tone of authority and pressure to bypass standard procedures. Upon closer inspection, Jason identifies that the sender's email address includes a minor alteration in the domain name—a form of domain spoofing. He examines the email headers, confirms the falsified sender identity, and cross-checks with the actual CEO’s activity logs to ensure there was no internal compromise. Immediately, Jason blocks the sender’s IP address at the firewall level, alerts the finance department to prevent any unauthorized transactions, and issues a company-wide advisory about the impersonation attempt. What type of phishing is Jason handling?

A.

Whaling

B.

Mail bombing

C.

Credential stuffing

D.

Spimming

Full Access
Question # 88

An attacker traced out and found the kind of websites a target company/individual is

frequently surfing and tested those particular websites to identify any possible

vulnerabilities. When the attacker detected vulnerabilities in the website, the attacker

started injecting malicious script/code into the web application that can redirect the

webpage and download the malware onto the victim’s machine. After infecting the

vulnerable web application, the attacker waited for the victim to access the infected web

application.

Identify the type of attack performed by the attacker.

A.

Watering hole

B.

Obfuscation application

C.

Directory traversal

D.

Cookie/Session poisoning

Full Access
Question # 89

A company facing a wave of spoofed payment emails launched an investigation and found that employees had unknowingly interacted with malicious sender domains. Despite blocking initial IPs and purging visible email content, similar threats resurfaced using altered variants. The team moved to eliminate recurring delivery mechanisms and close technical loopholes. Which step is most aligned with this eradication initiative?

A.

Contacting email domain registrars to request WHOIS masking of sender information

B.

Launching email-based simulation drills to evaluate user response to phishing

C.

Reviewing the email training curriculum related to financial transaction safety

D.

Creating email-specific URL deny-lists from decoded message components

Full Access
Question # 90

DigitalSoft, a major software development firm, recently discovered unauthorized access to its codebase. The culprit was a disgruntled employee who had been overlooked for a promotion. The company wants to prevent such insider threats in the future. What is the most effective measure it can implement?

A.

Implement mandatory password changes every 30 days.

B.

Implement a strict hierarchy where only senior employees have access to sensitive data.

C.

Use biometric authentication for accessing sensitive data.

D.

Conduct regular audits of user access and use behavior analytics.

Full Access
Question # 91

Attackers or insiders create a backdoor into a trusted network by installing an unsecured access point inside a firewall. They then use any software or hardware access point to perform an attack. Which of the following is this type of attack?

A.

Rogue- access point attack

B.

Password-based attack

C.

Malware attack

D.

Email infection

Full Access