
Containment, Eradication, and Recovery
Quiz
•
Professional Development
•
University
•
Practice Problem
•
Hard

Saniya Berzhanova
Used 4+ times
FREE Resource
Enhance your content in a minute
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?
Containment, Eradication, and Recovery
Preparation
Postincident Activity
Detection and Analysis
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?
Effectiveness of the strategy
Evidence preservation requirements
Log records generated by the strategy
Cost of the strategy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?
Eradication
Isolation
Segmentation
Removal
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?
Eradication
Isolation
Segmentation
Removal
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?
Sandbox
Playpen
IDS
DLP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?
Identifying the source of the attack
Eradication
Containment
Recovery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following activities does CompTIA classify as part of the recovery validation effort?
Rebuilding systems
Sanitization
Secure disposal
Scanning
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
BIR RDO 27 Caloocan Transfer Tax on Estate and Donation
Quiz
•
University - Professi...
17 questions
Business Quiz
Quiz
•
10th Grade - University
20 questions
Principles of management 2
Quiz
•
University
21 questions
The Video game quiz
Quiz
•
KG - University
15 questions
Assessment in Learning 1
Quiz
•
University
20 questions
Basic Electronics
Quiz
•
University
20 questions
Character Formation
Quiz
•
University
20 questions
SF Documentation and Recording Q#2
Quiz
•
University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
