New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 5 Question 90 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 90
Topic #: 5
[All 212-89 Questions]

A cybersecurity analyst at a technology firm discovers suspicious activity on a network segment dedicated to research and development. The initial indicators suggest a possible compromise of several endpoints with potential intellectual property theft. Given the sensitive nature of the data involved, what is the most effective method for the analyst to detect and validate the security incident?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Mollie
5 days ago
I'm not entirely sure, but I think correlating logs from different endpoints could provide more context about the suspicious activity.
upvoted 0 times
...
Desmond
10 days ago
I remember we discussed using network traffic analysis tools to spot anomalies. That might help in validating the incident.
upvoted 0 times
...
Jesus
15 days ago
Hmm, not sure where I'd start on this one. Validating the security incident seems crucial, so I guess I'd focus on gathering as much data as possible from the affected systems and the network.
upvoted 0 times
...
Vinnie
20 days ago
Alright, let's see. Detecting and validating the incident - that's the key here. I'd probably start with network monitoring and traffic analysis to try to identify the source and scope of the compromise.
upvoted 0 times
...
Thaddeus
26 days ago
Oof, this is a sensitive one with intellectual property at risk. I'd recommend a thorough investigation, maybe even bringing in some specialized incident response expertise to ensure we handle this properly.
upvoted 0 times
...
Bea
1 month ago
Okay, so we need to validate the security incident and detect the potential compromise. I think I'd focus on collecting forensic data from the affected endpoints to analyze for signs of intrusion.
upvoted 0 times
...
Lonny
1 month ago
Hmm, this seems like a tricky one. I'd start by reviewing the network logs and endpoint activity in detail to look for any anomalies or unusual behavior.
upvoted 0 times
...

Save Cancel