New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 9
Total 81 questions
Exam Code: 212-89                Update: Jan 15, 2026
Exam Name: EC Council Certified Incident Handler (ECIH v3)

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Exam Dumps: Updated Questions & Answers (January 2026)

Question # 1

Aarav, an IT support specialist, identifies that multiple employees have engaged with an email promoting free shopping vouchers, which appears suspicious. To minimize the potential threat, he instructs staff to report the message, classify it as junk, and remove it from their inboxes. He further advises them not to interact with similar messages in the future, even if they seem to come from internal contacts. Which best practice is Aarav reinforcing?

A.

Sort emails by priority

B.

Digitally sign email attachments

C.

Disable preview pane in the inbox

D.

Avoid replying to or forwarding suspicious emails

Question # 2

For analyzing the system, the browser data can be used to access various credentials.

Which of the following tools is used to analyze the history data files in Microsoft Edge browser?

A.

ChromeHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

MZHistoryView

Question # 3

Zaimasoft, a prominent IT organization, was attacked by perpetrators who directly targeted the hardware and caused irreversible damage to the hardware. In result, replacing or reinstalling the hardware was the only solution.

Identify the type of denial-of-service attack performed on Zaimasoft.

A.

ddos

B.

DoS

C.

PDoS

D.

DRDoS

Question # 4

Identify the network security incident where intended or authorized users are prevented from using system, network, or applications by flooding the network with a

high volume of traffic that consumes all existing network resources.

A.

XSS attack

B.

Denial-of-service

C.

URL manipulation

D.

SQL injection

Question # 5

Which of the following risk mitigation strategies involves execution of controls to

reduce the risk factor and brings it to an acceptable level or accepts the potential risk

and continues operating the IT system?

A.

Risk assumption

B.

Risk avoidance

C.

Risk planning

D.

Risk transference

Question # 6

FinFusion, a leading finance firm, discovered a slow leak of financial data over several months. Surprisingly, the leak was attributed to a high-ranking executive who was selling data to competitors. Keen on avoiding future breaches, what should be FinFusion's foremost action?

A.

Use advanced Employee Monitoring Tools that offer real-time threat alerts.

B.

Limit executive access to sensitive databases.

C.

Require weekly reports from executives on their data access and usage.

D.

Install security cameras in executive offices.

Question # 7

Which of the following port scanning techniques involves resetting the TCP connection

between client and server abruptly before completion of the three-way handshake

signals, making the connection half-open?

A.

Null scan

B.

Full connect scan

C.

Stealth scan

D.

Xmas scan

Question # 8

Which stage of the incident response and handling process involves auditing the system and network log files?

A.

Containment

B.

Incident triage

C.

Incident disclosure

D.

Incident eradication

Question # 9

Alexis is working as an incident responder in XYZ organization. She was asked to identify and attribute the actors behind an attack that took place recently. In order to do so, she is performing threat attribution that deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target. Which of the following types of threat attributions Alexis performed?

A.

Nation-state attribution

B.

Intrusion-set attribution

C.

True attribution

D.

Campaign attributio

Question # 10

An organization suffers a financial loss after an executive responds to a fraudulent email crafted as part of a spear phishing attack. After isolating affected systems and notifying internal stakeholders, the incident response team prepares a detailed report outlining the attack timeline, suspicious IP addresses, email metadata, phone scam details, and the amount lost. This report is forwarded to a government agency specializing in cybercrime to aid further investigation and potential restitution. Which aspect of the recovery process is the organization addressing?

A.

Legal escalation and investigation support

B.

Data redundancy planning

C.

Endpoint protection deployment

D.

Internal server reconfiguration

Page: 1 / 9
Total 81 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 15 Jan 2026