Exam Name: | EC Council Certified Incident Handler (ECIH v3) | ||
Exam Code: | 212-89 Dumps | ||
Vendor: | ECCouncil | Certification: | ECIH |
Questions: | 172 Q&A's | Shared By: | jennifer |
Which of the following are malicious software programs that infect computers and corrupt or delete the data on them?
ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?
Which of the following risk mitigation strategies involves execution of controls to
reduce the risk factor and brings it to an acceptable level or accepts the potential risk
and continues operating the IT system?
Which of the following types of digital evidence is temporarily stored in a digital device that requires constant power supply and is deleted if the power supply is interrupted?