Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following practices should not be considered during the recovery of organizational resources after an insider attack?

  1. Utilize cloud-to-cloud backup solutions

  2. Conduct a full incident review

  3. Rebuild trust with employees

  4. Communicate findings to all stakeholders

The correct answer is: Utilize cloud-to-cloud backup solutions

Considering the context of recovery after an insider attack, opting for cloud-to-cloud backup solutions is not appropriate as a primary focus during the recovery phase. This type of backup is generally geared towards ensuring data availability and integrity rather than addressing the specific nuances and impacts of an insider threat. After an insider attack, the emphasis should be on understanding the incident's scope, conducting a thorough review to identify vulnerabilities, and implementing corrective measures. This involves engaging in communication with stakeholders and rebuilding trust among employees who may have been affected or feel apprehensive about security practices. Prioritizing cloud-to-cloud backup solutions overlooks the necessity of addressing the human and operational factors essential for a holistic recovery. It is crucial to cultivate a secure environment by emphasizing communication, oversight, and trust rather than solely relying on technology-based recovery methods.