Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.
Answer(s): D
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and extent of an incident?
Answer(s): B
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system. These programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.
Answer(s): C
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated as:
Answer(s): A
Post your Comments and Discuss EC-Council 212-89 exam with other Community members:
Rohit commented on March 22, 2024 Pass the exam. I am officially certified now. Great questions. INDIA upvote
manisha commented on March 22, 2024 for exam practise INDIA upvote
Priscila commented on July 22, 2022 i find the xengine test engine simulator to be more fun than reading from pdf. GERMANY upvote
Fadil commented on August 08, 2023 It is very good Anonymous upvote
Priscila commented on July 22, 2022 I find the Xengine Test Engine Simulator to be more fun than reading from PDF. GERMANY upvote
Muhammed Hosain commented on May 31, 2021 I just pass my exam a 907 makr. Thank you team. INDIA upvote