Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-89 Exam Dumps - EC Council Certified Incident Handler (ECIH v3)

Go to page:
Question # 4

Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?

A.

Cache

B.

Disk

C.

Emails

D.

Temp files

Full Access
Question # 5

Chandler is a professional hacker who is targeting Technote organization. He wants to obtain important organizational information that is being transmitted between

different hierarchies. In the process, he is sniffing the data packets transmitted through the network and then analyzing them to gather packet details such as network, ports,

protocols, devices, issues in network transmission, and other network specifications. Which of the following tools Chandler must employ to perform packet analysis?

A.

BeEf

B.

IDAPro

C.

Omnipeek

D.

shARP

Full Access
Question # 6

Which one of the following is Inappropriate Usage Incidents?

A.

Insider Threat

B.

Reconnaissance Attack

C.

Access Control Attack

D.

Denial of Service Attack

Full Access
Question # 7

Which of the following has been used to evade IDS and IPS?

A.

Fragmentation

B.

TNP

C.

HTTP

D.

SNMP

Full Access
Question # 8

Employee monitoring tools are mostly used by employers to find which of the following?

A.

Lost registry keys

B.

Conspiracies

C.

Malicious insider threats

D.

Stolen credentials

Full Access
Go to page: