Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What tool did Rock use to analyze applications and infrastructure logs on the victim's device?

  1. pCloudy

  2. Kandji

  3. Mobile Verification Toolkit (MVT)

  4. Argus-SAF

The correct answer is: pCloudy

The Mobile Verification Toolkit (MVT) is specifically designed to analyze logs from applications and devices, particularly in the context of investigating potential surveillance or malware issues. It allows users to examine mobile device logs for signs of compromise and track how applications interact with the system. In your scenario, if Rock is analyzing applications and infrastructure logs on a victim's device, the Mobile Verification Toolkit would be an appropriate tool for this task because of its capabilities in identifying and analyzing suspicious activity within mobile environments. Other tools listed may serve different purposes or are not primarily focused on log analysis, making them less suitable for this specific need.