Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which practice can make a cloud environment vulnerable to online threats?

  1. Implement strict access controls

  2. Allow sharing of user credentials

  3. Use multi-factor authentication

  4. Regularly update software

The correct answer is: Allow sharing of user credentials

Allowing the sharing of user credentials significantly increases vulnerability in a cloud environment. When users share their credentials, it undermines the principle of least privilege, which states that individuals should have access only to the information essential for their job functions. This practice exposes the environment to numerous security risks. For instance, if multiple individuals have access to the same credentials, it becomes challenging to track user activity properly. This can lead to unauthorized access, as it’s not clear who is responsible for any actions taken with those shared credentials. It compromises accountability and can create an environment where malicious actors exploit these shared accounts more freely, leading to potential data breaches or unauthorized actions within the cloud environment. In contrast, implementing strict access controls and using multi-factor authentication enhance security by ensuring that only authorized users gain access and that their identities are verified through multiple means. Regularly updating software is also crucial as it helps patch known vulnerabilities and protects against exploits that could be used against outdated systems.