Mr. Smith is a lead incident responder of a small financial enterprise having few branches in Australia.Recently, the company suffered a massive attack losing USD 5 million through an inter-banking system. After in-depth investigation on the case, it was found out that the incident occurred because 6 months ago the attackers penetrated the network through a minor vulnerability and maintained the access without any user being aware of it. Then, he tried to delete user's fingerprints and performed a lateral movement to the computer of a person with privileges in the inter-banking system. Finally, the attacker gained access and did fraudulent transactions.Based on the above scenario, identify the most accurate kind of attack.
Answer(s): C
https://en.wikipedia.org/wiki/Advanced_persistent_threat
James is a professional hacker and is employed by an organization to exploit their cloud services. In order to achieve this, James created anonymous access to the cloud services to carry out various attacks such as password and key cracking, hosting malicious data, and DDoS attacks.Which of the following threats is he posing to the cloud platform?
Answer(s): D
Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in Florida. She was asked to work on an incident response plan. As part of the plan, she decided to enhance and improve the security infrastructure of the enterprise. She has incorporated a security strategy that allows security professionals to use several protection layers throughout their information system. Due to multiple layer protection, this security strategy assists in preventing direct attacks against the organization's information system as a break in one layer only leads the attacker to the next layer.Identify the security strategy Shally has incorporated in the incident response plan.
https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
Ikeo Corp. hired an incident response team to assess the enterprise security. As part of the incident handling and response process, the IR team is reviewing the current security policies implemented by the enterprise. The IR team finds that employees of the organization do not have any restrictions on Internet access: they are allowed to visit any site, download any application, and access a computer or network from a remote location. Considering this as the main security threat, the IR team plans to change this policy as it can be easily exploited by attackers. Which of the following security policies is the IR team planning to modify?
Answer(s): A
https://info-savvy.com/what-is-information-security-policies-what-r-the-types-of-security-policies/#:~:text=Promiscuous%20Policy%3A,network%20from%20a%20foreign%20location
Which of the following is not the responsibility of first responders?
Post your Comments and Discuss EC-Council 212-89 exam dumps with other Community members:
Antonio DS Commented on November 08, 2025 Thenks to all account and users also thanks to free-exam dumps for this shared document. It is very useful. Thanks Antonio Anonymous
Rohit Commented on March 22, 2024 Pass the exam. I am officially certified now. Great questions. INDIA
manisha Commented on March 22, 2024 for exam practise INDIA
Fadil Commented on August 08, 2023 It is very good Anonymous
Priscila Commented on July 22, 2022 I find the Xengine Test Engine Simulator to be more fun than reading from PDF. GERMANY
Priscila Commented on July 22, 2022 i find the xengine test engine simulator to be more fun than reading from pdf. GERMANY
Muhammed Hosain Commented on May 31, 2021 I just pass my exam a 907 makr. Thank you team. INDIA