Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
A. Outsider threats
B. Social Engineers
C. Insider threats
D. Zombies
Keyloggers do NOT:
A. Run in the background
B. Alter system files
C. Secretly records URLs visited in browser, keystrokes, chat conversations, ...etc
D. Send log file to attacker's email or upload it to an ftp server
Which of the following is NOT one of the techniques used to respond to insider threats:
A. Placing malicious users in quarantine network, so that attack cannot be spread
B. Preventing malicious users from accessing unclassified information
C. Disabling the computer systems from network connection
D. Blocking malicious user accounts
Which of the following is NOT one of the common techniques used to detect Insider threats:
A. Spotting an increase in their performance
B. Observing employee tardiness and unexplained absenteeism
C. Observing employee sick leaves
D. Spotting conflicts with supervisors and coworkers
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could be:
A. Antivirus software detects the infected files
B. Increase in the number of e-mails sent and received
C. System files become inaccessible
D. All the above
The main difference between viruses and worms is:
A. Worms require a host file to propagate while viruses don't
B. Viruses require a host file to propagate while Worms don't
C. Viruses don't require user interaction; they are self-replicating malware
D. Viruses and worms are common names for the same malware
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:
A. Decrease in network usage
B. Established connection attempts targeted at the vulnerable services
C. System becomes instable or crashes
D. All the above
A software application in which advertising banners are displayed while the program is running that delivers ads to display pop-up windows or bars that appears on a computer screen or browser is called:
A. adware (spelled all lower case)
B. Trojan
C. RootKit
D. Virus
E. Worm
The Malicious code that is installed on the computer without user's knowledge to acquire information from the user's machine and send it to the attacker who can access it remotely is called:
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.