Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which step is ineffective in restoring a mobile device's functionality post-security incident?

  1. Reinstall the operating system

  2. Do not use multi-factor authentication mechanisms

  3. Reset network settings

  4. Restore from a clean backup

The correct answer is: Do not use multi-factor authentication mechanisms

In the context of restoring a mobile device's functionality after a security incident, opting against the use of multi-factor authentication mechanisms is ineffective. Multi-factor authentication (MFA) is a crucial security measure that enhances account protection by requiring multiple forms of verification before granting access. By not employing MFA, an individual increases the risk of unauthorized access and breaches when attempting to restore the device's functionality. In contrast, the other options are effective strategies following a security incident. Reinstalling the operating system can eliminate malware or compromised files, ensuring that the device is operating with a clean slate. Resetting network settings helps to remove stuck configurations that might cause connectivity issues post-incident. Additionally, restoring from a clean backup ensures that the device retrieves only safe and secure data, minimizing the risk of bringing back compromised elements. Therefore, the absence of multi-factor authentication undermines the overall security posture and makes the restoration process less effective.