Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

212-89 ECCouncil EC Council Certified Incident Handler (ECIH v3) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ECCouncil 212-89 EC Council Certified Incident Handler (ECIH v3) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 5
Total 305 questions

In which of the following types of insider threats an insider who is uneducated on

potential security threats or simply bypasses general security procedures to meet

workplace efficiency?

A.

Compromised insider

B.

Negligent insider

C.

Professional insider

D.

Malicious insider

QualTech Solutions is a leading security services enterprise. Dickson works as an incident responder with this firm. He is performing vulnerability assessment to identify

the security problems in the network, using automated tools to identify the hosts, services, and vulnerabilities present in the enterprise network.

Based on the above scenario, identify the type of vulnerability assessment performed by Dickson.

A.

Internal assessment

B.

Active assessment

C.

Passive assessment

D.

External assessment

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

A.

Risk assessment

B.

Risk assumption

C.

Risk mitigation

D.

Risk avoidance

Sophia, an incident handler at a cloud hosting provider, is investigating reports of intermittent web server slowdowns and timeouts. Upon analyzing router logs, she finds an unusually high number of incomplete connection attempts, causing the server’s memory and CPU resources to spike. Suspecting a form of resource exhaustion attack, she applies a protective configuration to the router that allows it to validate connection requests before they reach the server. Soon after this change, the number of partial connections decreases, and the server regains stable performance. What was the purpose of this action?

A.

To scan for malicious payloads

B.

To prevent brute-force logins

C.

To block SYN flood attempts

D.

To monitor port scans

Jason, a cybersecurity analyst in the incident response team, begins investigating several complaints from employees who received emails urgently requesting wire transfers to an overseas account. The emails appeared to come from the company’s CEO, using a tone of authority and pressure to bypass standard procedures. Upon closer inspection, Jason identifies that the sender's email address includes a minor alteration in the domain name—a form of domain spoofing. He examines the email headers, confirms the falsified sender identity, and cross-checks with the actual CEO’s activity logs to ensure there was no internal compromise. Immediately, Jason blocks the sender’s IP address at the firewall level, alerts the finance department to prevent any unauthorized transactions, and issues a company-wide advisory about the impersonation attempt. What type of phishing is Jason handling?

A.

Whaling

B.

Mail bombing

C.

Credential stuffing

D.

Spimming

Following a high-profile breach investigation at a multinational corporation, an incident handler is tasked with the critical role of preserving, packaging, and transporting digital evidence from a server believed to be compromised and utilized as part of a global botnet operation. The challenge lay not only in the technical complexities of the operation but also in adhering to stringent legal and procedural frameworks to ensure the evidence remained admissible in court. Which of the following options ensures the highest level of evidence integrity during its transport?

A.

On-site encryption of the server’s data, followed by its upload to secure cloud storage.

B.

Creating a forensic image of the server's drives, verifying image hashes, storing images on encrypted drives, and maintaining detailed transport logs.

C.

Encasing the server in anti-static packaging with chain-of-custody labels.

D.

Transferring server data to a new drive using a write blocker and GPS tracking.

Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used for further investigation of the incident. In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?

A.

Containment

B.

Incident recording

C.

Incident triage

D.

Eradication

Which of the following port scanning techniques involves resetting the TCP connection

between client and server abruptly before completion of the three-way handshake

signals, making the connection half-open?

A.

Null scan

B.

Full connect scan

C.

Stealth scan

D.

Xmas scan

Which of the following details are included in the evidence bags?

A.

Error messages that contain sensitive information and files containing passworos

B.

Software version information and web application source code

C.

Sensitive cirectories, personal, and organizational email adcress

D.

Date and time of seizure, exhibit number, anc name of incident responder

In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?

A.

Incident recording and assignment

B.

Containment

C.

Notification

D.

Incident triage

Sameer, part of the incident response team, is alerted that several employees unknowingly entered credentials on a fake login page after receiving a spoofed internal notification. The domain name used in the attack had subtle character changes. What kind of unauthorized access incident did this attack begin with?

A.

DNS footprinting

B.

Port scanning

C.

Social engineering

D.

ARP spoofing

A national research agency was recently subjected to a comprehensive cybersecurity compliance audit. During the audit, reviewers evaluated how the agency's incident response unit manages harmful code samples during investigations. The assessment revealed that team members often interacted with dangerous file payloads directly on enterprise-connected systems used for general operations. Furthermore, no precautionary renaming was applied to prevent accidental triggering, and sensitive materials were placed in areas accessible by non-specialized personnel. The auditors flagged these practices as severely noncompliant with safe sample processing protocols and recommended urgent changes to prevent operational fallout or accidental outbreaks. Which best practice for secure handling of malicious code was most clearly disregarded in this case?

A.

Storing malware samples with non-executable file extensions in isolated environments.

B.

Encrypting all malware sample files using symmetric encryption.

C.

Create vulnerability documentation for each malware sample to support threat profiling and archival.

D.

Tagging malware sample files with platform-specific behavior indicators for improved categorization.

OmegaTech Corp identified unauthorized remote access to its primary server and data exfiltration tunnels. Simultaneously, IoT device firmware corruption was reported. As the first responder, what should Olivia prioritize?

A.

Start reinstalling IoT firmware

B.

Begin isolating the primary server and cutting off remote access

C.

Alert all divisions to initiate a system-wide shutdown

D.

Engage the AI-driven security system to trace unauthorized access

Patrick is doing a cyber forensic investigation. He is in the process of collecting physical

evidence at the crime scene.

Which of the following elements he must consider while collecting physical evidence?

A.

Open ports, services, and operating system (OS) vulnerabilities

B.

DNS information including domain and subdomains

C.

Published name servers and web application source code

D.

Removable media, cable, and publications

Lina, a threat responder, uses the Nuix Adaptive Security tool to analyze alerts of suspicious file uploads. She identifies that an insider used Outlook to send attachments to unknown email addresses during off-hours. The tool captures screenshots, file metadata, and keystroke logs. What type of evidence is Lina primarily relying on?

A.

User behavior analytics and endpoint monitoring

B.

SIEM event correlation

C.

Network forensics logs

D.

Host-based intrusion prevention logs

Identify the network security incident where intended or authorized users are prevented from using system, network, or applications by flooding the network with a

high volume of traffic that consumes all existing network resources.

A.

XSS attack

B.

Denial-of-service

C.

URL manipulation

D.

SQL injection

Noah, a physical security officer, reviewed entry logs after a breach was reported in the data center. Surveillance showed a contract worker accessing restricted areas using another employee's badge. The access control system lacked biometric verification. Which physical security control could have best prevented this incident?

A.

Scheduled patch management

B.

Dual authentication

C.

Role-based firewall segmentation

D.

Encrypted file systems

Which of the following is NOT part of the static data collection process?

A.

Evidence oxa mi nation

B.

System preservation

C.

Password protection

D.

Evidence acquisition

A mid-sized tech company leveraging a cloud-based infrastructure noticed unauthorized interactions between cloud-hosted applications. Upon investigation, the security team discovered confusion over whether internal teams or the cloud provider were tasked with overseeing certain services, which caused delays in the incident response. Which action would best support managing this cloud security incident?

A.

Performing regular vulnerability scans on container images

B.

Assigning all incident response tasks to external cloud support teams

C.

Understanding shared responsibilities for incident response in cloud environments

D.

Disabling automatic scaling features to prevent service misuse

Tyler, a system administrator, notices high CPU usage and unknown processes on a workstation used to download unauthorized applications. Which indicator best describes this inappropriate usage incident?

A.

Attack against an external party

B.

Unauthorized service usage

C.

Inappropriate resource usage

D.

Access to inappropriate materials

Page: 3 / 5
Total 305 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved