Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which type of attack is characterized by unauthorized access to information through deceptive emails or messages?

  1. OS-based attack

  2. Phishing attack

  3. Browser-based attack

  4. Brute force attack

The correct answer is: Phishing attack

The answer is identified as a phishing attack because this type of attack specifically involves deceiving individuals through emails or messages, which often appear to be from trusted sources. The aim is to trick the recipient into divulging sensitive information, such as usernames, passwords, or credit card details. Phishing generally employs social engineering techniques, making the deception appear legitimate to the target. In this context, phishing attacks leverage the familiarity and trust that individuals have in familiar brands, companies, or colleagues to lure them into a false sense of security. Attackers often create fake websites that mimic real ones or use email addresses that closely resemble legitimate ones to enhance their chances of success. This tactic can lead to significant security breaches and data leaks, as unwary victims may provide access to their personal, financial, or organizational information. While other types of attacks, such as OS-based, browser-based, and brute force attacks, involve different methods and focus, they do not primarily utilize deceptive communications to gain unauthorized access to sensitive information. Instead, those attacks rely on exploiting vulnerabilities in operating systems, web browsers, or attempting to guess passwords, respectively, rather than manipulating victims through misrepresentation in communication.