Free EC-Council 212-89 Exam Questions (page: 11)

Employee monitoring tools are mostly used by employers to find which of the following?

  1. Lost registry keys
  2. Stolen credentials
  3. Conspiracies
  4. Malicious insider threats

Answer(s): D



Andrew, an incident responder, is performing risk assessment of the client organization. As a part of the risk assessment process, he identified the boundaries of the IT systems, along with the resources and the information that constitute the systems. Identify the risk assessment step Andrew is performing.

  1. System characterization
  2. Control analysis
  3. Likelihood determination
  4. Control recommendations

Answer(s): C



A malicious, security-breaking program is disguised as a useful program. Such executable programs, which are installed when a file is opened, allow others to control a user's system.
What is this type of program called?

  1. Spyware
  2. Virus
  3. Trojan
  4. Worm

Answer(s): C



Which of the following is a standard framework that provides recommendations for implementing information security controls for organizations that initiate, implement, or maintain information security management systems (ISMSs)?

  1. ISO/IEC 27002
  2. ISO/IEC 27035
  3. PCI DSS
  4. RFC 2196

Answer(s): A



Allan performed a reconnaissance attack on his corporate network as part of a red-team activity. He scanned the IP range to find live host IP addresses.
What type of technique did he use to exploit the network?

  1. Port scanning
  2. DNS footprinting
  3. Social engineering
  4. Ping sweeping

Answer(s): D



Viewing page 11 of 53



Post your Comments and Discuss EC-Council 212-89 exam prep with other Community members:

212-89 Exam Discussions & Posts