Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What step comes after collecting the IP address of the sender from the email header?

  1. Open the email to trace its header

  2. Search the IP in WHOIS

  3. Notify the sender of the issue

  4. Delete the email

The correct answer is: Open the email to trace its header

After collecting the IP address of the sender from the email header, the next logical step is to search the IP in WHOIS. This process involves querying a WHOIS database to obtain detailed registration information about the IP address in question. This information can reveal important insights, such as the organization to which the IP is registered, as well as the geographic location of the IP address. Tracing the header provides the necessary details for understanding the origin of the email, but it is the subsequent search in WHOIS that allows for further investigation and helps in identifying potential threats, especially in cases of phishing or spam. It's crucial in incident handling to establish the context and relevance of the source of communication. Options such as notifying the sender or deleting the email might seem tempting, but they do not aid in furthering the investigation or understanding the nature of the threat, which is the primary concern after identifying the sender's IP address.