Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is a specific method to limit the impact of eavesdropping attacks?

  1. Regularly change passwords

  2. Educate employees on security protocols

  3. Use privacy screens when discussing sensitive information

  4. Restrict remote access

The correct answer is: Use privacy screens when discussing sensitive information

Using privacy screens when discussing sensitive information is an effective specific method to limit the impact of eavesdropping attacks. Eavesdropping, often carried out through unauthorized interception of conversations or visual observation, poses a significant threat, particularly in environments where sensitive data is handled. Privacy screens act as a physical barrier that restricts the viewing angles of onlookers, ensuring that only individuals directly in front of a screen can see the displayed information. This tangible measure effectively minimizes the risk of unauthorized individuals overhearing sensitive discussions or peering over shoulders to obtain confidential data. While changing passwords regularly and educating employees about security protocols are important components of a broader security strategy, they do not directly mitigate the risks of eavesdropping in the same way that privacy screens do. Similarly, restricting remote access is crucial for protecting systems from unauthorized access, but it does not specifically address the issue of eavesdropping in physical or visual contexts. Therefore, the targeted approach of using privacy screens stands out as the most direct method to counteract the specific threat of eavesdropping attacks.