212-89 ECCouncil EC Council Certified Incident Handler (ECIH v3) Free Practice Exam Questions (2025 Updated)
Prepare effectively for your ECCouncil 212-89 EC Council Certified Incident Handler (ECIH v3) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Rinni is an incident handler and she is performing memory dump analysis.
Which of following tools she can use in order to perform memory dump analysis?
Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?
Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?
SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?
The following steps describe the key activities in forensic readiness planning:
1. Train the staff to handle the incident and preserve the evidence
2. Create a special process for documenting the procedure
3. Identify the potential evidence required for an incident
4. Determine the source of the evidence
5. Establish a legal advisory board to guide the investigation process
6. Identify if the incident requires full or formal investigation
7. Establish a policy for securely handling and storing the collected evidence
8. Define a policy that determines the pathway to legally extract electronic evidence
with minimal disruption
Identify the correct sequence of steps involved in forensic readiness planning.
Which of the following is an Inappropriate usage incident?
Ross is an incident manager (IM) at an organization, and his team provides support to all users in the organization who are affected by threats or attacks. David, who is the organization's internal auditor, is also part of Ross's incident response team. Which of the following is David's responsibility?
James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.
Which of the following commands helps James in determining all the executable files for running processes?
Michael is an incident handler at CyberTech Solutions. He is performing detection and analysis of a cloud security incident. He is analyzing the file systems, slack spaces, and
metadata of the storage units to find hidden malware and evidence of malice.
Identify the cloud security incident handled by Michael.
Which of the following is a standard framework that provides recommendations for implementing information security controls for organizations that initiate, implement, or maintain information security management systems (ISMSs)?
Which of the following options describes common characteristics of phishing emails?
Racheal is an incident handler working in InceptionTech organization. Recently,
numerous employees are complaining about receiving emails from unknown senders. In
order to prevent employees against spoofing emails and keeping security in mind,
Racheal was asked to take appropriate actions in this matter. As a part of her
assignment, she needs to analyze the email headers to check the authenticity of received
emails.
Which of the following protocol/authentication standards she must check in email
header to analyze the email authenticity?
Which of the following digital evidence temporarily stored on a digital device that
requires a constant power supply and is deleted if the power supply is interrupted?
Which of the following is the BEST method to prevent email incidents?
Which of the following best describes an email issued as an attack medium, in which several messages are sent to a mailbox to cause overflow?
Which of the following is a technique used by attackers to make a message difficult to understand through the use of ambiguous language?
Which of the following tools helps incident handlers to view the file system, retrieve deleted data, perform timeline analysis, web artifacts, etc., during an incident response process?
A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?
Nervous Nat often sends emails with screenshots of what he thinks are serious incidents, but they always turn out to be false positives. Today, he sends another screenshot, suspecting a nation-state attack. As usual, you go through your list of questions, check your resources for information to determine whether the screenshot shows a real attack, and determine the condition of your network. Which step of IR did you just perform?
Bonney’s system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware
incident from spreading?