Free 212-89 Exam Braindumps (page: 4)

Page 3 of 41

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.

  1. URL Manipulation
  2. XSS Attack
  3. SQL Injection
  4. Denial of Service Attack

Answer(s): D



Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and extent of an incident?

  1. Eradication
  2. Containment
  3. Identification
  4. Data collection

Answer(s): B



Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system. These programs may unleash dangerous programs that may erase the unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.

  1. Cookie tracker
  2. Worm
  3. Trojan
  4. Virus

Answer(s): C



Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated as:

  1. (Probability of Loss) X (Loss)
  2. (Loss) / (Probability of Loss)
  3. (Probability of Loss) / (Loss)
  4. Significant Risks X Probability of Loss X Loss

Answer(s): A






Post your Comments and Discuss EC-Council 212-89 exam with other Community members:

212-89 Discussions & Posts