The following steps describe the key activities in forensic readiness planning:1. Train the staff to handle the incident and preserve the evidence2. Create a special process for documenting the procedure3. Identify the potential evidence required for an incident4. Determine the source of the evidence5. Establish a legal advisory board to guide the investigation process6. Identify if the incident requires full or formal investigation7. Establish a policy for securely handling and storing the collected evidence8. Define a policy that determines the pathway to legally extract electronic evidence with minimal disruptionIdentify the correct sequence of steps involved in forensic readiness planning.
Answer(s): C
https://info-savvy.com/forensic-readiness-planning/
Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.Identify the forensic investigation phase in which Bob is currently in.
Answer(s): D
https://resources.infosecinstitute.com/topic/computer-forensics-investigation-case-study/
John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique.Identify the type of attack John is performing on the target organization.
Answer(s): A
https://usa.kaspersky.com/resource-center/definitions/pharming
Otis is an incident handler working in Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis was asked to take the charge and look into the matter. While auditing the enterprise security, he found the traces of an attack, where the proprietary information was stolen from the enterprise network and was passed onto the competitors.Which of the following information security incidents Delmont organization faced?
https://www.vmware.com/topics/glossary/content/cyber-espionage.html
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user's information and system. These programs may unleash dangerous programs that may erase the unsuspecting user's disk and send the victim's credit card numbers and passwords to a stranger.
https://www.techtarget.com/searchsecurity/definition/Trojan-horse
Post your Comments and Discuss EC-Council 212-89 exam dumps with other Community members:
Antonio DS Commented on November 08, 2025 Thenks to all account and users also thanks to free-exam dumps for this shared document. It is very useful. Thanks Antonio Anonymous
Rohit Commented on March 22, 2024 Pass the exam. I am officially certified now. Great questions. INDIA
manisha Commented on March 22, 2024 for exam practise INDIA
Fadil Commented on August 08, 2023 It is very good Anonymous
Priscila Commented on July 22, 2022 I find the Xengine Test Engine Simulator to be more fun than reading from PDF. GERMANY
Priscila Commented on July 22, 2022 i find the xengine test engine simulator to be more fun than reading from pdf. GERMANY
Muhammed Hosain Commented on May 31, 2021 I just pass my exam a 907 makr. Thank you team. INDIA