New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 4 Question 74 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 74
Topic #: 4
[All 212-89 Questions]

Sam. an employee of a multinational company, sends emails to third-party organizations with a spoofed email address of his organization. How can you categorize this type of incident?

Show Suggested Answer Hide Answer
Suggested Answer: A

Shally has incorporated the Defense-in-depth strategy into the incident response plan for Texas Pvt. Ltd. Defense-in-depth is a layered security approach that involves implementing multiple security measures and controls throughout an information system. This strategy is designed to provide several defensive barriers to protect against threats and attacks, ensuring that if one layer is compromised, others still provide protection. The goal is to create a multi-faceted defense that addresses potential vulnerabilities in various areas, including physical security, network security, application security, and user education. Reference: The Incident Handler (ECIH v3) courses and study guides often emphasize the importance of a Defense-in-depth strategy in creating robust security infrastructures to protect against a wide range of cyber threats.


Contribute your Thoughts:

0/2000 characters
Karina
3 months ago
It's a clear violation of security policies, no doubt!
upvoted 0 times
...
Roslyn
3 months ago
Wait, is spoofing really that serious?
upvoted 0 times
...
Elfriede
3 months ago
Sounds more like unauthorized access to me.
upvoted 0 times
...
Rene
4 months ago
I agree, spoofing emails is misuse of company resources.
upvoted 0 times
...
Rodolfo
4 months ago
This is definitely an inappropriate usage incident.
upvoted 0 times
...
Dannette
4 months ago
I feel like this is definitely not a denial-of-service incident, but I’m torn between inappropriate usage and unauthorized access.
upvoted 0 times
...
Rosalind
4 months ago
This seems similar to a practice question we did on phishing, but I don't recall if it falls under network intrusion or something else.
upvoted 0 times
...
Mose
4 months ago
I'm not entirely sure, but I remember something about spoofing being linked to unauthorized access. Could it be that?
upvoted 0 times
...
Lino
5 months ago
I think this might be an inappropriate usage incident since Sam is misusing his company's email for unauthorized communication.
upvoted 0 times
...
Hillary
5 months ago
Network intrusion? Denial-of-service? I'm a bit confused on how to categorize this. I'll have to review the definitions of each incident type to make sure I'm choosing the right one.
upvoted 0 times
...
Marylou
5 months ago
Okay, I think I've got it. Since he's sending emails from a spoofed address, that's a form of impersonation, which would fall under the Inappropriate usage incident category. Option B is my pick.
upvoted 0 times
...
Oretha
5 months ago
Hmm, I'm not sure about this one. Could it also be considered an unauthorized access incident since he's using a spoofed email address? I'll have to think about that a bit more.
upvoted 0 times
...
Karl
5 months ago
This seems like a straightforward incident of email spoofing, so I'd go with option B, Inappropriate usage incident.
upvoted 0 times
...
Carissa
9 months ago
Network intrusion? More like 'network infraction'! Sam's gonna be in hot water for this one.
upvoted 0 times
Annabelle
8 months ago
C) Unauthorized access incident.
upvoted 0 times
...
Isadora
8 months ago
B) Inappropriate usage incident
upvoted 0 times
...
Lennie
9 months ago
A) Network intrusion incident
upvoted 0 times
...
...
Graham
10 months ago
Haha, Sam's really going for the 'denial-of-service' on his company's reputation with this stunt. Good luck explaining that one to HR!
upvoted 0 times
Leah
9 months ago
He's risking unauthorized access by doing that.
upvoted 0 times
...
Judy
9 months ago
Sam is really playing with fire by spoofing the company's email address.
upvoted 0 times
...
Jean
9 months ago
That's definitely an inappropriate usage incident.
upvoted 0 times
...
...
Chantell
10 months ago
I'd say it's an inappropriate usage incident. Sending spoofed emails is just bad form, even if it's not technically a breach.
upvoted 0 times
Kendra
9 months ago
C) It could also be considered unauthorized access, since he's pretending to be someone he's not.
upvoted 0 times
...
Simona
10 months ago
B) I agree, it's definitely not the right way to communicate.
upvoted 0 times
...
Serina
10 months ago
A) Inappropriate usage incident.
upvoted 0 times
...
...
Luisa
10 months ago
This is clearly an unauthorized access incident. Sam is impersonating his organization, which is a big no-no.
upvoted 0 times
Nilsa
10 months ago
I agree, it's a serious violation. He could be causing harm to his organization's reputation.
upvoted 0 times
...
Catarina
10 months ago
That's definitely an unauthorized access incident. Sam should not be spoofing his organization's email address.
upvoted 0 times
...
...
Jesus
10 months ago
I think it could also be considered as inappropriate usage incident.
upvoted 0 times
...
Odelia
10 months ago
I agree with Pearly, it's a serious breach of security.
upvoted 0 times
...
Pearly
11 months ago
That's definitely unauthorized access incident.
upvoted 0 times
...

Save Cancel