Free 212-89 Exam Braindumps (page: 6)

Page 5 of 41

Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?

  1. An insider intentionally deleting files from a workstation
  2. An attacker redirecting user to a malicious website and infects his system with Trojan
  3. An attacker infecting a machine to launch a DDoS attack
  4. An attacker using email with malicious code to infect internal workstation

Answer(s): A



Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?

  1. Evidence Supervisor
  2. Evidence Documenter
  3. Evidence Manager
  4. Evidence Examiner/ Investigator

Answer(s): D



The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed below, if blocked, can help in preventing Denial of Service attack?

  1. SAM service
  2. POP3 service
  3. SMTP service
  4. Echo service

Answer(s): D



A US Federal agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to agency’s reporting timeframe guidelines, this incident should be reported within two (2) HOURS of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the activity. Which incident category of the US Federal Agency does this incident belong to?

  1. CAT 5
  2. CAT 1
  3. CAT 2
  4. CAT 6

Answer(s): C






Post your Comments and Discuss EC-Council 212-89 exam with other Community members:

212-89 Discussions & Posts