Free 212-89 Exam Braindumps (page: 13)

Page 12 of 41

Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the information system?

  1. Configuring firewall to default settings
  2. Inspecting the process running on the system
  3. Browsing particular government websites
  4. Sending mails to only group of friends

Answer(s): B



An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular job role requires the use of those resources. Which of the following is NOT a fundamental element of access control policy?

  1. Action group: group of actions performed by the users on resources
  2. Development group: group of persons who develop the policy
  3. Resource group: resources controlled by the policy
  4. Access group: group of users to which the policy applies

Answer(s): B



Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infects Microsoft Word files?

  1. Micro Virus
  2. File Infector
  3. Macro Virus
  4. Boot Sector virus

Answer(s): C



The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables members of CSIRT to undertake any necessary actions on behalf of their constituency?

  1. Full-level authority
  2. Mid-level authority
  3. Half-level authority
  4. Shared-level authority

Answer(s): A






Post your Comments and Discuss EC-Council 212-89 exam with other Community members:

212-89 Discussions & Posts