Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is the second step in the threat-hunting process after forming a hypothesis?

  1. Trigger

  2. Investigation

  3. Response/resolution

  4. Hypothesis

The correct answer is: Trigger

In the threat-hunting process, after forming a hypothesis, the second step involves triggering or activating the search for the threat based on that hypothesis. This step typically involves defining the specific indicators of compromise or patterns to look for, which serves to direct the investigation effectively. Triggering represents the shift from theoretical formulation to applied scrutiny where the hypothesis will be tested in practice. This means gathering relevant data, logs, and context to identify potentially malicious activities aligned with the established hypothesis. It is a critical phase that helps focus the efforts of the threat hunters on particular areas, maximizing the efficiency and effectiveness of subsequent investigations. The focus on initiating a targeted search after formulating a hypothesis reinforces the structured approach to threat hunting, emphasizing the need for clear direction in the investigative process.