Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following practices will not help an incident responder in securing email communication?

  1. Always use secure passwords

  2. Hover over links to identify their destinations

  3. Subscribe to sites that access the email contact list

  4. Encrypt sensitive emails before sending

The correct answer is: Subscribe to sites that access the email contact list

The correct choice is based on understanding how various practices impact the security of email communication. Subscribing to sites that access the email contact list does not contribute to the security of email communication; rather, it may pose a risk. This practice can expose users to potential security breaches or malicious attacks since it shares sensitive contact information with external sources that may not have robust security measures in place. In contrast, using secure passwords is essential for protecting email accounts from unauthorized access. Strong passwords are a fundamental aspect of account security, helping to prevent breaches that could compromise email communications. Hovering over links to identify their destinations is a practical habit that mitigates the risk of phishing attacks by ensuring users are aware of where a link leads before they click on it. Additionally, encrypting sensitive emails serves to protect the contents of the email from being read by unauthorized parties, providing confidentiality and securing the information being shared. In summary, while practices such as using secure passwords, identifying link destinations, and encrypting emails are integral to securing email communications, subscribing to sites that expose contact lists does not contribute positively to this objective and can even undermine security efforts.