Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following steps should an incident handler not follow while handling a malware incident?

  1. Use public channels for transferring malware files

  2. Encrypt malware files before transfer

  3. Monitor network traffic for anomalies

  4. Use secure channels for communication

The correct answer is: Use public channels for transferring malware files

Using public channels for transferring malware files is highly inadvisable due to the associated risks. Public channels pose significant security threats, such as unauthorized access, data interception, and the potential for data leakage. Sharing malware through such channels can also inadvertently cause further infections or compromise sensitive systems, as these environments lack the necessary safeguards to protect the malware's integrity or confidentiality. In contrast, encrypting malware files before transfer is a critical step for ensuring that even if the files are intercepted, they remain unreadable to unauthorized recipients. Monitoring network traffic for anomalies allows incident handlers to identify unusual behaviors that could indicate a malware spread or other security threats, thus enhancing the overall security posture. Using secure channels for communication is essential as it helps to protect sensitive information and maintain the confidentiality and integrity of data being exchanged. Thus, transferring malware files through public channels directly undermines the fundamental principles of secure communications and incident handling, making it the most inappropriate action to take in the context of managing a malware incident.