Free 212-89 Exam Braindumps (page: 8)

Page 7 of 41

A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are defined:

  1. Identification Vulnerabilities
  2. Control analysis
  3. Threat identification
  4. System characterization

Answer(s): C



In the Control Analysis stage of the NIST’s risk assessment methodology, technical and none technical control methods are classified into two categories. What are these two control categories?

  1. Preventive and Detective controls
  2. Detective and Disguised controls
  3. Predictive and Detective controls
  4. Preventive and predictive controls

Answer(s): A



Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?

  1. Scenario testing
  2. Facility testing
  3. Live walk-through testing
  4. Procedure testing

Answer(s): D



An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves auditing the system and network log files?

  1. Incident recording
  2. Reporting
  3. Containment
  4. Identification

Answer(s): D






Post your Comments and Discuss EC-Council 212-89 exam with other Community members:

212-89 Discussions & Posts