New Year Special 75% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 75brite

ECCouncil Updated 212-89 Exam Questions and Answers by julian

Page: 3 / 20

ECCouncil 212-89 Exam Overview :

Exam Name: EC Council Certified Incident Handler (ECIH v3)
Exam Code: 212-89 Dumps
Vendor: ECCouncil Certification: ECIH
Questions: 272 Q&A's Shared By: julian
Question 12

DeltaCorp, a global e-commerce company, received an email sent to the financial department claiming to be from the CEO, requesting an urgent transfer of funds. To determine the legitimacy of this potentially deceptive email, which of the following should be the primary focus of the investigation?

Options:

A.

Inspect the email headers for spoofing or sender IP irregularities.

B.

Contact the vendor mentioned in the email.

C.

Review past emails for similar language.

D.

Scan the email server for malware.

Discussion
Faye
Yayyyy. I passed my exam. I think all students give these dumps a try.
Emmeline Dec 13, 2025
Definitely! I have no doubt new students will find them to be just as helpful as I did.
Addison
Want to tell everybody through this platform that I passed my exam with excellent score. All credit goes to Cramkey Exam Dumps.
Libby Dec 25, 2025
That's good to know. I might check it out for my next IT certification exam. Thanks for the info.
Elise
I've heard that Cramkey is one of the best websites for exam dumps. They have a high passing rate and the questions are always up-to-date. Is it true?
Cian Dec 27, 2025
Definitely. The dumps are constantly updated to reflect the latest changes in the certification exams. And I also appreciate how they provide explanations for the answers, so I could understand the reasoning behind each question.
Miriam
Highly recommended Dumps. 100% authentic and reliable. Passed my exam with wonderful score.
Milan Dec 20, 2025
I see. Thanks for the information. I'll definitely keep Cramkey in mind for my next exam.
Neve
Will I be able to achieve success after using these dumps?
Rohan Dec 16, 2025
Absolutely. It's a great way to increase your chances of success.
Question 13

Which of the following is a standard framework that provides recommendations for implementing information security controls for organizations that initiate, implement, or maintain information security management systems (ISMSs)?

Options:

A.

ISO/IEC 27002

B.

ISO/IEC 27035

C.

PCI DSS

D.

RFC 219G

Discussion
Question 14

XYZ Inc. was affected by a malware attack and James, being the incident handling and

response (IH&R) team personnel handling the incident, found out that the root cause of

the incident is a backdoor that has bypassed the security perimeter due to an existing

vulnerability in the deployed firewall. James had contained the spread of the infection

and removed the malware completely. Now the organization asked him to perform

incident impact assessment to identify the impact of the incident over the organization

and he was also asked to prepare a detailed report of the incident.

Which of the following stages in IH&R process is James working on?

Options:

A.

Notification

B.

Evidence gathering and forensics analysis

C.

Post-incident activities

D.

Eradication

Discussion
Question 15

Jason, a cybersecurity analyst in the incident response team, begins investigating several complaints from employees who received emails urgently requesting wire transfers to an overseas account. The emails appeared to come from the company’s CEO, using a tone of authority and pressure to bypass standard procedures. Upon closer inspection, Jason identifies that the sender's email address includes a minor alteration in the domain name—a form of domain spoofing. He examines the email headers, confirms the falsified sender identity, and cross-checks with the actual CEO’s activity logs to ensure there was no internal compromise. Immediately, Jason blocks the sender’s IP address at the firewall level, alerts the finance department to prevent any unauthorized transactions, and issues a company-wide advisory about the impersonation attempt. What type of phishing is Jason handling?

Options:

A.

Whaling

B.

Mail bombing

C.

Credential stuffing

D.

Spimming

Discussion
Page: 3 / 20
Title
Questions
Posted

212-89
PDF

$26.25  $104.99

212-89 Testing Engine

$31.25  $124.99

212-89 PDF + Testing Engine

$41.25  $164.99