Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which practice helps incident responders eradicate Azure-based security incidents?

  1. Restrict inbound SMB access to the systems

  2. Allowing all traffic to simplify access

  3. Disabling security alert notifications

  4. Using default configurations for services

The correct answer is: Restrict inbound SMB access to the systems

In the context of incident response for Azure-based security incidents, restricting inbound SMB (Server Message Block) access is a crucial practice. SMB is a network file sharing protocol that allows applications and users to read and write to files and request services from server programs. By restricting inbound SMB access, organizations can minimize exposure to potential attacks that target this protocol, such as ransomware or other malicious activities that exploit vulnerabilities within SMB. Limiting access helps reduce the attack surface, preventing unauthorized access and reducing the risk of lateral movement within the network or escalation of privileges. This control is particularly important in cloud environments like Azure, where workloads may be distributed and interconnected, creating more opportunities for a security incident to escalate if proper access controls are not enforced. In contrast, allowing all traffic might simplify access but also opens up systems to various security threats, while disabling security alert notifications removes critical real-time visibility into incidents, which is essential for effective incident response. Using default configurations for services often leaves systems vulnerable because these configurations may not account for specific security needs or best practices. Thus, restricting inbound SMB access is indeed a best practice to help eradicate Azure-based security incidents effectively.