Which of the following is NOT a digital forensic analysis tool:
A. Access Data FTK
B. EAR/ Pilar
C. Guidance Software EnCase Forensic
D. Helix
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the established connections on it:
A. "arp" command
B. "netstat 璦n" command
C. "dd" command
D. "ifconfig" command
The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy
Lack of forensic readiness may result in:
A. Loss of clients thereby damaging the organization's reputation
B. System downtime
C. Data manipulation, deletion, and theft
D. All the above
Insiders may be:
A. Ignorant employees
B. Carless administrators
C. Disgruntled staff members
D. All the above
Which of the following may be considered as insider threat(s):
A. An employee having no clashes with supervisors and coworkers
B. Disgruntled system administrators
C. An employee who gets an annual 7% salary raise
D. An employee with an insignificant technical literacy and business process knowledge
Spyware tool used to record malicious user's computer activities and keyboard stokes is called:
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Insiders understand corporate business functions. What is the correct sequence of activities performed by Insiders to damage company assets:
A. Gain privileged access, install malware then activate
B. Install malware, gain privileged access, then activate
C. Gain privileged access, activate and install malware
D. Activate malware, gain privileged access then install malware
The USB tool (depicted below) that is connected to male USB Keyboard cable and not detected by anti- spyware tools is most likely called:
A. Software Key Grabber
B. Hardware Keylogger
C. USB adapter
D. Anti-Keylogger
Which is the incorrect statement about Anti-keyloggers scanners: A. Detect already installed Keyloggers in victim machines
B. Run in stealthy mode to record victims online activity
C. Software tools
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.