212-89 Exam Question 1

Which one of the following is the correct flow of the stages in an incident handling and response (IH&R) process?
  • 212-89 Exam Question 2

    Shall y, an incident handler, is working for a company named Texas Pvt.Ltd.based in Florida. She was asked to work on an incident response plan. As part of the plan, she decided to enhance and improve the security infrastructure of the enterprise. She has incorporated a security strategy that allows security professionals to use several protection layers throughout their information system. Due to multiple layer protection, this security strategy assists in preventing direct attacks against the organization's information system as a break in one layer only leads the attacker to the next layer.
    Identify the security strategy Shall y has incorporated in the incident response plan.
  • 212-89 Exam Question 3

    During the process of detecting and containing malicious emails, incident responders should examine the originating IP address of the emails.
    The steps to examine the originating IP address are as follow:
    1. Search for the IP in the WHOIS database
    2. Open the email to trace and find its header
    3. Collect the IP address of the sender from the header of the received mail
    4. Look for the geographic address of the sender in the WHOIS database
    Identify the correct sequence of steps to be performed by the incident responders to examine originating IP address of the emails.
  • 212-89 Exam Question 4

    Eric works as a system administrator in ABC organization. He granted privileged users with unlimited permissions to access the systems. These privileged users can misuse their rights unintentionally or maliciously or attackers can trick them to perform malicious activities.
    Which of the following guidelines helps incident handlers to eradicate insider attacks by privileged users?
  • 212-89 Exam Question 5

    They type of attack that prevents the authorized users to access networks, systems, or applications by
    exhausting the network resources and sending illegal requests to an application is known as: