Exam Name: | EC Council Certified Incident Handler (ECIH v3) | ||
Exam Code: | 212-89 Dumps | ||
Vendor: | ECCouncil | Certification: | ECIH |
Questions: | 168 Q&A's | Shared By: | dalton |
Which of the following is a common tool used to help detect malicious internal or compromised actors?
Robert is an incident handler working for Xsecurity Inc. One day, his organization
faced a massive cyberattack and all the websites related to the organization went
offline. Robert was on duty during the incident and he was responsible to handle the
incident and maintain business continuity. He immediately restored the web application
service with the help of the existing backups.
According to the scenario, which of the following stages of incident handling and
response (IH&R) process does Robert performed?
John is performing memory dump analysis in order to find out the traces of malware.
He has employed volatility tool in order to achieve his objective.
Which of the following volatility framework commands he will use in order to analyze running process from the memory dump?
Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in
Florida. She was asked to work on an incident response plan. As part of the plan, she
decided to enhance and improve the security infrastructure of the enterprise. She has
incorporated a security strategy that allows security professionals to use several
protection layers throughout their information system. Due to multiple layer protection,
this security strategy assists in preventing direct attacks against the organization’s
information system as a break in one layer only leads the attacker to the next layer.
Identify the security strategy Shally has incorporated in the incident response plan.