Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following activities will not help in eradicating OT-based security incidents?

  1. Avoid using jump boxes on the OT platform

  2. Implement regular software updates

  3. Conduct frequent security audits

  4. Allow external access for vendors without restrictions

The correct answer is: Allow external access for vendors without restrictions

The choice regarding allowing external access for vendors without restrictions is not conducive to eradicating OT-based security incidents. In fact, unrestricted access could introduce significant vulnerabilities into the operational technology environment. This approach can lead to potential exploitation by external parties, increasing the risk of a security incident. Security best practices dictate that vendor access should be tightly controlled and monitored to prevent unauthorized actions that could compromise the integrity of OT systems. In contrast, regularly implementing software updates, conducting frequent security audits, and avoiding the use of jump boxes on the OT platform are all strategies designed to enhance the security posture of an organization. Software updates help ensure that vulnerabilities are patched in a timely manner. Regular security audits can identify weaknesses or potential attack vectors, allowing for proactive remediation. Meanwhile, avoiding jump boxes minimizes the risk of lateral movement across the network by reducing unnecessary points of access. Each of these practices contributes positively to the resilience of OT environments against security threats.