Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What practice should an incident handler implement to handle web application security incidents safely?

  1. Maintain an inventory of organizational IT Infrastructure

  2. Create a blacklist of all legitimate IP addresses

  3. Allow unrestricted access to web applications

  4. Rely on user feedback for security measures

The correct answer is: Maintain an inventory of organizational IT Infrastructure

Maintaining an inventory of organizational IT infrastructure is a crucial practice for an incident handler when managing web application security incidents. This inventory provides a comprehensive understanding of the assets within the organization, including servers, applications, databases, and other critical components. Having detailed knowledge about the infrastructure helps incident handlers respond effectively to security incidents by identifying which system might be affected, what vulnerabilities could be exploited, and the scope of potential damage. This practice enables quicker identification and isolation of impacted systems, ensures that all relevant data and resources are secured during an incident, and facilitates an informed incident response strategy. Additionally, an updated inventory assists in risk assessment and future planning by highlighting dependencies and potential points of failure within the IT ecosystem. In contrast, other options do not contribute effectively to safely handling web application security incidents. Creating a blacklist of legitimate IP addresses is a reactive approach that may not adequately defend against new threats. Allowing unrestricted access to web applications severely compromises security and increases vulnerability. Relying on user feedback for security measures can lead to incomplete or misguided information, as users may not always be aware of the underlying security requirements or potential threats.