Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following is not an audit trails and log monitoring guideline for eradicating insider threats?

  1. Analyze logs for unusual activities regularly

  2. Do not consider the legal implications before using monitoring controls

  3. Maintain detailed logs for access to sensitive information

  4. Secure logs to prevent tampering

The correct answer is: Do not consider the legal implications before using monitoring controls

The rationale for identifying the statement about not considering the legal implications before using monitoring controls as an incorrect guideline for eradicating insider threats lies in the importance of legal compliance and ethical considerations when implementing monitoring practices. When organizations monitor employee activities, there are legal frameworks and regulations in place that govern privacy and surveillance. Understanding these implications is crucial to ensure that monitoring does not violate laws or organizational policies, which could lead to legal challenges, loss of employee trust, or negative repercussions for the organization. In contrast, the other options emphasize best practices in audit trails and log monitoring. Regularly analyzing logs for unusual activities helps to detect potential insider threats early. Maintaining detailed logs for access to sensitive information ensures there is a thorough record that can be reviewed if suspicious behavior is noted. Securing logs to prevent tampering protects the integrity of the data and ensures that it remains a reliable source of truth during investigations. Thus, the focus on legal implications underlines the necessity of balanced approaches in security practices that respect both security needs and employee rights.