Containment, Eradication, and Recovery

Containment, Eradication, and Recovery

University

19 Qs

quiz-placeholder

Similar activities

LEAN MANUFACTURING

LEAN MANUFACTURING

University

15 Qs

TEORI HUMANISTIK

TEORI HUMANISTIK

University

20 Qs

How to talk about what goes on

How to talk about what goes on

12th Grade - University

20 Qs

QUIZ 3 : TOPIC 11 [INCOMPLETE RECORDS & SINGLE ENTRY]

QUIZ 3 : TOPIC 11 [INCOMPLETE RECORDS & SINGLE ENTRY]

1st Grade - University

15 Qs

quiz finance

quiz finance

University

20 Qs

Pronouns Quiz

Pronouns Quiz

University

15 Qs

Tier2

Tier2

University

20 Qs

quiz scrum

quiz scrum

University

20 Qs

Containment, Eradication, and Recovery

Containment, Eradication, and Recovery

Assessment

Quiz

Professional Development

University

Practice Problem

Hard

Created by

Saniya Berzhanova

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?

Containment, Eradication, and Recovery

Preparation

Postincident Activity

Detection and Analysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?

Effectiveness of the strategy

Evidence preservation requirements

Log records generated by the strategy

Cost of the strategy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?

Eradication

Isolation

Segmentation

Removal

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?

Eradication

Isolation

Segmentation

Removal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?

Sandbox

Playpen

IDS

DLP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?

Identifying the source of the attack

Eradication

Containment

Recovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following activities does CompTIA classify as part of the recovery validation effort?

Rebuilding systems

Sanitization

Secure disposal

Scanning

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?