EC-Council 212-89 Exam (page: 2)
EC-Council Certified Incident Handler
Updated on: 25-Dec-2025

Viewing Page 2 of 34

The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.

  1. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, F- Constituency, G-Incident Manager
  2. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F- Constituency, G-Incident Manager
  3. A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F- Incident Analyst, G-Public relations
  4. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F- Constituency, G-Incident Coordinator

Answer(s): C



Which of the following is an appropriate flow of the incident recovery steps?

  1. System Operation-System Restoration-System Validation-System Monitoring
  2. System Validation-System Operation-System Restoration-System Monitoring
  3. System Restoration-System Monitoring-System Validation-System Operations
  4. System Restoration-System Validation-System Operations-System Monitoring

Answer(s): D



A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT part of the computer risk policy?

  1. Procedure to identify security funds to hedge risk
  2. Procedure to monitor the efficiency of security controls
  3. Procedure for the ongoing training of employees authorized to access the system
  4. Provisions for continuing support if there is an interruption in the system or if the system crashes

Answer(s): C



Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.

  1. URL Manipulation
  2. XSS Attack
  3. SQL Injection
  4. Denial of Service Attack

Answer(s): D



Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and extent of an incident?

  1. Eradication
  2. Containment
  3. Identification
  4. Data collection

Answer(s): B



Viewing Page 2 of 34



Share your comments for EC-Council 212-89 exam with other users:

Priscila 7/22/2022 9:59:00 AM

i find the xengine test engine simulator to be more fun than reading from pdf.
GERMANY