An assault on system security that is derived from an intelligent threat is called:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
An adversary attacks the information resources to gain undue advantage is called:
A. Defensive Information Warfare
B. Offensive Information Warfare
C. Electronic Warfare
D. Conventional Warfare
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
A. Risk Assumption
B. Research and acknowledgment
C. Risk limitation
D. Risk absorption
Based on the some statistics; what is the typical number one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
A. Analysis
B. Preparation
C. Examination
D. Collection
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization's internal auditor is part of the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:
A. Configure information security controls
B. Perform necessary action to block the network traffic from suspected intruder
C. Identify and report security loopholes to the management for necessary actions
D. Coordinate incident containment activities with the information security officer
One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers' security vulnerabilities and by responding effectively to potential information security incidents. Identify the incident response approach that focuses on developing the infrastructure and security processes before the occurrence or detection of an event or any incident:
A. Interactive approach
B. Introductive approach
C. Proactive approach
D. Qualitative approach
Which of the following incidents are reported under CAT -5 federal agency category?
A. Exercise/ Network Defense Testing
B. Malicious code
C. Scans/ probes/ Attempted Access
D. Denial of Service DoS
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.