A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?
Answer(s): A
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the system identified?
Answer(s): C
ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?
A security policy will take the form of a document or a collection of documents, depending on the situation or usage. It can become a point of reference in case a violation occurs that results in dismissal or other penalty. Which of the following is NOT true for a good security policy?
Answer(s): B
Post your Comments and Discuss EC-Council 212-89 exam with other Community members:
Rohit commented on March 22, 2024 Pass the exam. I am officially certified now. Great questions. INDIA upvote
manisha commented on March 22, 2024 for exam practise INDIA upvote
Priscila commented on July 22, 2022 i find the xengine test engine simulator to be more fun than reading from pdf. GERMANY upvote
Fadil commented on August 08, 2023 It is very good Anonymous upvote
Priscila commented on July 22, 2022 I find the Xengine Test Engine Simulator to be more fun than reading from PDF. GERMANY upvote
Muhammed Hosain commented on May 31, 2021 I just pass my exam a 907 makr. Thank you team. INDIA upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 212-89 content, but please register or login to continue.