A computer virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.Which of the following is not a symptom of virus hoax message?
Answer(s): A
A US Federal Agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to agency's reporting timeframe guidelines, this incident should be reported within 2 h of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the activity.Which incident category of US Federal Agency does this incident belong to?
Answer(s): C
https://www.pearlsoftware.com/resources/Experts/OMBRequirements.pdf
Eric who is an incident responder is working on developing incident-handling plans and procedures. As part of this process, he is performing analysis on the organizational network to generate a report and to develop policies based on the acquired results.Which of the following tools will help him in analyzing network and its related traffic?
https://portswigger.net/burp/documentation/desktop/penetration-testing
Clark, a professional hacker, exploited the web application of a target organization by tampering the form and parameter values. He successfully exploited the web application and gained access to the information assets of the organization.Identify the vulnerability in the web application exploited by the attacker.
https://www.imperva.com/learn/application-security/sql-injection-sqli/
In which of the following types of insider threats an insider who is uneducated on potential security threats or simply bypasses general security procedures to meet workplace efficiency?
https://digitalguardian.com/blog/insider-outsider-data-security-threats
Post your Comments and Discuss EC-Council 212-89 exam dumps with other Community members: