Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following focuses on protecting against unauthorized access to sensitive data?

  1. Access Control

  2. Cryptography

  3. Network Security

  4. Application Security

The correct answer is: Access Control

Access control is an essential security measure that specifically aims to protect against unauthorized access to sensitive data. It entails defining who is allowed to view and use resources in a computing environment. By implementing access control mechanisms, organizations can ensure that only authorized personnel have the ability to access and manipulate sensitive information, thereby minimizing the risk of data breaches and maintaining confidentiality. This approach is typically operationalized through policies and technologies that enforce user authentication and authorization. Examples include user IDs, passwords, biometric recognition, and role-based access control (RBAC), which segment access based on user roles within an organization. While other options, such as cryptography, network security, and application security, also play vital roles in protecting data, they do not solely focus on the prevention of unauthorized access. Cryptography secures data through encryption and decryption processes, making it unreadable to unauthorized users but does not inherently control access. Network security encompasses measures to protect the integrity of networks and data during transmission but does not specifically target user access control. Application security involves securing software applications but focuses more on preventing vulnerabilities within those applications rather than regulating access to data directly.