The following steps describe the key activities in forensic readiness planning:1. Train the staff to handle the incident and preserve the evidence2. Create a special process for documenting the procedure3. Identify the potential evidence required for an incident4. Determine the source of the evidence5. Establish a legal advisory board to guide the investigation process6. Identify if the incident requires full or formal investigation7. Establish a policy for securely handling and storing the collected evidence8. Define a policy that determines the pathway to legally extract electronic evidence with minimal disruptionIdentify the correct sequence of steps involved in forensic readiness planning.
Answer(s): C
https://info-savvy.com/forensic-readiness-planning/
Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.Identify the forensic investigation phase in which Bob is currently in.
Answer(s): D
https://resources.infosecinstitute.com/topic/computer-forensics-investigation-case-study/
John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique.Identify the type of attack John is performing on the target organization.
Answer(s): A
https://usa.kaspersky.com/resource-center/definitions/pharming
Otis is an incident handler working in Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis was asked to take the charge and look into the matter. While auditing the enterprise security, he found the traces of an attack, where the proprietary information was stolen from the enterprise network and was passed onto the competitors.Which of the following information security incidents Delmont organization faced?
https://www.vmware.com/topics/glossary/content/cyber-espionage.html
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user's information and system. These programs may unleash dangerous programs that may erase the unsuspecting user's disk and send the victim's credit card numbers and passwords to a stranger.
https://www.techtarget.com/searchsecurity/definition/Trojan-horse
Post your Comments and Discuss EC-Council 212-89 exam dumps with other Community members: