Alex is an incident handler for Tech-o-Tech Inc. and he is intended to identify any possible insider threats in his organization.Which of the following insider threat detection techniques can be used by him to detect insider threats based on the behavior of a doubtful employee both individually and in a group?
Answer(s): D
Which of the following is the correct flow of the stages in an incident handling and response (IH&R) process?
Answer(s): C
https://www.cm-alliance.com/cybersecurity-blog/what-are-the-6-phases-in-a-cyber-incident- response-plan
For analyzing the system, the browser data can be used to access various credentials.Which of the following tools is used to analyze the history data files in Microsoft Edge browser?
https://www.nirsoft.net/articles/view-edge-history.html
Which of the following information security personnel handles incidents from management and technical point of view?
Answer(s): B
https://www.atlassian.com/incident-management/incident-response/incident-commander#2-why-do- teams-need-an-incident-commander
An attacker traced out and found the kind of websites a target company/individual is frequently surfing and tested those particular websites to identify any possible vulnerabilities. When the attacker detected vulnerabilities in the website, the attacker started injecting malicious script/code into the web application that can redirect the webpage and download the malware onto the victim's machine. After infecting the vulnerable web application, the attacker waited for the victim to access the infected web application.Identify the type of attack performed by the attacker.
Answer(s): A
https://en.wikipedia.org/wiki/Watering_hole_attack
Post your Comments and Discuss EC-Council 212-89 exam dumps with other Community members: