Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


In the insider risk matrix, what indicates a high risk posed by an insider?

  1. Low technical literacy and process knowledge

  2. High technical literacy and low process knowledge

  3. High technical literacy and high process knowledge

  4. Low technical literacy and high process knowledge

The correct answer is: High technical literacy and high process knowledge

The indication of a high risk posed by an insider primarily relates to the combination of high technical literacy and high process knowledge. When an individual possesses both of these traits, they have the capability to understand intricate systems and processes, as well as the skills to manipulate those systems effectively. Such individuals can exploit their knowledge in ways that could lead to data breaches, system manipulations, or other malicious activities. High technical literacy means that the insider can navigate complex technical environments, potentially allowing them to bypass security measures and access sensitive information. Concurrently, having high process knowledge means they are aware of how various processes within the organization function, including any potential weaknesses or points of leverage that could be exploited. Together, these factors significantly heighten the risk that the insider could engage in harmful activities, whether for personal gain or out of malice towards the organization. In contrast, combinations showing low technical literacy or low process knowledge indicate a lesser ability to commit such acts since the insider may lack the necessary skills or understanding required to exploit the organization's systems effectively.