![](https://assets.isu.pub/document-structure/230208101857-a7fcf1bac7e9b2fcf71c2f19819d72bc/v1/5f0e755652026d89c081d6d25a71cf27.jpeg)
![](https://assets.isu.pub/document-structure/230208101857-a7fcf1bac7e9b2fcf71c2f19819d72bc/v1/242d90ec96ccb015e817a61f23a58253.jpeg)
![](https://assets.isu.pub/document-structure/230208101857-a7fcf1bac7e9b2fcf71c2f19819d72bc/v1/f8e326da571830fd61a6b4c9d7b4fb7d.jpeg)
• Perform enough practice with EC-Council system with related EC-Council 212-89 certification subjects
• Identify the key configuration, workflow and data flow
• Understand the all Syllabus Topics of Exam which are Given in Description.
• Identify your weak areas from practice test and do more practice with system
• Repeat practice exams and try to score 100% on www.edusum.com
Q 1) In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as: Option.
a) System characterization
b) System classification
c) Asset valuation
d) Asset Identification
Q 2) Rinni is an incident handler and she is performing memory dump analysis. Which of following tools she can use in order to perform a memory dump analysis?
Option.
a) Proc mon and Process Explorer
b) iNetSim
c) Security breach
d) OllyDbg and IDA Pro
Q 3) Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with all cases related to computer security incidents in which a customer is involved either as a victim or as a suspect?
Option.
a) SURFnet-CERT
b) NET-CERT
c) Funet CERT
d) DFN-CERT
Q 4) Organizations or incident response teams need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally attacked the computer system. EVIDENCE PROTECTION is also required to meet legal compliance issues. Which of the following documents helps in protecting evidence from physical or logical damage?
Option.
a) Chain-of-Precedence
b) Chain-of-Custody
c) Network and host log records
d) Forensic analysis report
Q 5) Unusual logins, accessing sensitive information not used for the job role, and the use of personal external storage drives on company assets are all signs of which of the following?
Option.
a) Security breach
b) Over-working
c) Insider threat
d) Lack of job rotation
• For more information on 212-89 Certification please refer to FAQs.
• The 212-89 certification is increasingly becoming important for the career of employees.
• The fees information are for the informative purposes and do not serve as an official offering and are subject to change
• Focus on the guide for online registration and you will find it out.