Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which practice can significantly reduce malware security incidents in an organization?

  1. Open all email attachments regardless of file type

  2. Do not open files with .bat, .com, .exe, .pif, or .vbs extensions

  3. Enable email auto-download of attachments

  4. Use weak passwords for ease of access

The correct answer is: Do not open files with .bat, .com, .exe, .pif, or .vbs extensions

The practice of not opening files with .bat, .com, .exe, .pif, or .vbs extensions is particularly effective in reducing malware incidents within an organization because these types of files are commonly associated with executable code that can run scripts or programs. By avoiding these extensions, an organization significantly minimizes the risk of inadvertently executing malicious software that can lead to data breaches, system compromises, or network infections. Executable files can contain hidden malware that activates once the file is opened, potentially causing serious damage. Injurious software can perform actions like information theft, network exploitation, or providing backdoor access to cybercriminals. Therefore, implementing a policy where employees are trained to recognize and avoid opening these risky file types is a proactive and essential step in bolstering an organization's cybersecurity posture. In contrast, practices like opening all email attachments indiscriminately or enabling automatic download of attachments expose the organization to increased risk, as they could inadvertently lead to executing harmful software. Additionally, using weak passwords creates vulnerabilities in access security, making it easier for unauthorized users to gain access, which is a separate but equally important concern.