Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Identify the practice that will not aid incident responders in mitigating attacks stemming from vulnerable and outdated components.

  1. Retain unnecessary components, functions, dependencies, and files

  2. Regularly update all components and libraries

  3. Conduct vulnerability assessments regularly

  4. Remove unused services and functions

The correct answer is: Retain unnecessary components, functions, dependencies, and files

Retaining unnecessary components, functions, dependencies, and files can significantly contribute to the risk profile of an organization. Outdated and vulnerable components are often targets for attackers, and keeping them increases the attack surface. Incident responders benefit from a streamlined and secure environment, which involves identifying and eliminating anything that is no longer needed. Regular updates, vulnerability assessments, and the removal of unused services and functions all contribute to a proactive security posture. These practices ensure that known vulnerabilities are addressed, risks are assessed frequently, and only necessary services are running, reducing the potential points of exploitation. In contrast, the practice of retaining outdated components explicitly contradicts the principles of vulnerability management and incident response, thereby not aiding in mitigating attacks effectively.