New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 1 Question 29 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 29
Topic #: 1
[All 212-89 Questions]

Dan is a newly appointed information security professional in a renowned organization. He is supposed to follow multiple security strategies to eradicate malware incidents. Which of the following is not considered as a good practice for maintaining information security and eradicating malware incidents?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Dexter
4 months ago
I thought trusted sources were safe... this is confusing!
upvoted 0 times
...
Nilsa
4 months ago
Just to clarify, D is the odd one out here, right?
upvoted 0 times
...
Page
4 months ago
Totally agree, A, B, and C are solid practices!
upvoted 0 times
...
Cassie
4 months ago
Wait, are we really saying not to trust trusted sources? Sounds off.
upvoted 0 times
...
Nichelle
4 months ago
D is definitely not a good practice!
upvoted 0 times
...
Valentine
5 months ago
I vaguely recall that we should avoid executing files with certain extensions, so that makes me think option C is a good practice. D seems off to me.
upvoted 0 times
...
Theron
5 months ago
I think we practiced a similar question where it was emphasized that trusted sources are generally okay. So, I would lean towards D as the incorrect one.
upvoted 0 times
...
Katy
5 months ago
I remember discussing how downloading from trusted sources is usually safe, so I think option D is the one that doesn't fit.
upvoted 0 times
...
Ty
5 months ago
I'm not entirely sure, but I feel like all the other options are definitely good practices. Maybe it's D, but I could be wrong.
upvoted 0 times
...
Kent
5 months ago
Yammer, got it. This question seems straightforward enough, but I'll make sure to double-check my work before submitting the answer. Don't want to miss any details.
upvoted 0 times
...
Jeniffer
5 months ago
Ah, I see what they're getting at now. Option D makes the most sense - you'd want to enable data integrity checks to ensure the logs and data you're indexing haven't been tampered with, for auditing and legal purposes.
upvoted 0 times
...
Vi
9 months ago
Option D? Seriously? Next they'll be telling us to download free antivirus software from a sketchy website. Gotta love these security exam questions.
upvoted 0 times
...
Ronnie
10 months ago
Option D, really? Guess they're trying to see if we're paying attention. I bet the guy who wrote this question has a pet rock named 'Malware' at home.
upvoted 0 times
Scarlet
8 months ago
C) Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on
upvoted 0 times
...
Elina
9 months ago
B) Do not click on web browser pop-up windows
upvoted 0 times
...
Jesus
9 months ago
A) Do not download or execute applications from third-party sources
upvoted 0 times
...
...
Refugia
10 months ago
Hah, the 'trusted sources' one is a trick question if I ever saw one. You can't be too careful these days, even the 'trusted' guys might slip up.
upvoted 0 times
Cyril
9 months ago
C) Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on
upvoted 0 times
...
Chaya
9 months ago
B) Do not click on web browser pop-up windows
upvoted 0 times
...
Meaghan
9 months ago
A) Do not download or execute applications from third-party sources
upvoted 0 times
...
...
Loise
10 months ago
Ah, I see what they're getting at. Trusting any source completely is a bad idea. Gotta stay vigilant, even with the 'trusted' ones.
upvoted 0 times
...
Cammy
10 months ago
I think the answer is C) Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on. It's important to be cautious with file extensions.
upvoted 0 times
...
Alonzo
10 months ago
Option D? That can't be right, downloading from trusted sources is like the first rule of malware prevention!
upvoted 0 times
Dominga
9 months ago
C) Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on
upvoted 0 times
...
Lacresha
10 months ago
B) Do not click on web browser pop-up windows
upvoted 0 times
...
Mirta
10 months ago
A) Do not download or execute applications from third-party sources
upvoted 0 times
...
...
Justine
11 months ago
I disagree, I believe the correct answer is B) Do not click on web browser pop-up windows.
upvoted 0 times
...
Lynda
11 months ago
I think the answer is D) Do not download or execute applications from trusted sources.
upvoted 0 times
...

Save Cancel