212-89 Exam Details

  • Exam Code
    :212-89
  • Exam Name
    :EC Council Certified Incident Handler (ECIH v3)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :232 Q&As
  • Last Updated
    :Jan 10, 2026

EC-COUNCIL 212-89 Online Questions & Answers

  • Question 1:

    Which one of the following is the correct flow of the stages in an incident handling and response (IHandR) process?

    A. Preparation -* Incident recording -> Incident triage -* Containment -*# Eradication -?Recovery -* Post-incident activities
    B. Containment -* Incident recording -* Incident triage -> Preparation -* Recovery -> Eradication -* Post-incident activities
    C. Incident recording -> Preparation -> Containment * Incident triage -> Recovery > Eradication -?Post- incident activities
    D. Incident triage -?Eradication -# Containment -* Incident recording -* Preparation -* Recovery -* Post-incident activities

  • Question 2:

    Clark is investigating a cybercrime at TechSoft Solutions. While investigating the case, he needs to collect volatile information such as running services, their process IDs, startmode, state, and status. Which of the following commands will help Clark to collect such information from running services?

    A. Openfiles
    B. netstat b
    C. wmic
    D. net file

  • Question 3:

    In which of the following stages of incident handling and response (IHandR) process do the incident handlers try to find out the root cause of the incident along with the threat actors behind the incidents, threat vectors, etc.?

    A. Post-incident activities
    B. Incident triage
    C. Evidence gathering and forensics analysis
    D. Incident recording and assignment

  • Question 4:

    An attacker after performing an attack decided to wipe evidences using artifact wiping techniques to evade forensic investigation. He applied magnetic field to the digital media device, resulting in an entirely clean device of any previously stored data.

    Identify the artifact wiping technique used by the attacker.

    A. File wiping utilities
    B. Disk degaussing/destruction
    C. Disk cleaning utilities
    D. Syscall proxying

  • Question 5:

    According to NITS, what are the 5 main actors in cloud computing?

    A. Provider, carrier, auditor, broker, and seller
    B. Consumer, provider, carrier, auditor, ano broker
    C. Buyer, consumer, carrier, auditor, and broker
    D. None of these

  • Question 6:

    During the process of detecting and containing malicious emails, incident responders should examine the originating IP address of the emails. The steps to examine the originating IP address are as follow:

    1.

    Search for the IP in the WHOIS database

    2.

    Open the email to trace and find its header

    3.

    Collect the IP address of the sender from the header of the received mail

    4.

    Look for the geographic address of the sender in the WHOIS database

    Identify the correct sequence of steps to be performed by the incident responders to examine originating IP address of the emails.

    A. 4-->1-->2-->3
    B. 2-->1-->4-->3
    C. 1-->3-->2-->4
    D. 2-->3-->1-->4

  • Question 7:

    Stanley works as an incident responder at a top MNC based out of Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company.

    While investigating the crime, he collected the evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of jury so that the evidence explains the facts clearly and further helps in obtaining an expert opinion on the same to confirm the investigation process.

    In the above scenario, what is the characteristic of the digital evidence Stanley tried to preserve?

    A. Believable
    B. Complete
    C. Authentic
    D. Admissible

  • Question 8:

    Johnson an incident handler is working on a recent web application attack faced by the organization. As part of this process, he performed data preprocessing in order to analyzing and detecting the watering hole attack. He preprocessed the outbound network traffic data collected from firewalls and proxy servers and started analyzing the user activities within a certain time period to create time-ordered domain sequences to perform further analysis on sequential patterns. Identify the data-preprocessing step performed by Johnson.

    A. Filtering invalid host names
    B. Identifying unpopular domains
    C. Host name normalization
    D. User-specific sessionization

  • Question 9:

    Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?

    A. HR log book
    B. Point of contact
    C. Email list
    D. Phone number list

  • Question 10:

    If a hacker cannot find any other way to attack an organization, they can influence an employee or a disgruntled staff member. What type of threat is this?

    A. Phishing attack
    B. Insider attack
    C. Footprinting
    D. Identity theft

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.