
Containment, Eradication, and Recovery
Authored by Saniya Berzhanova
Professional Development
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?
Containment, Eradication, and Recovery
Preparation
Postincident Activity
Detection and Analysis
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?
Effectiveness of the strategy
Evidence preservation requirements
Log records generated by the strategy
Cost of the strategy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?
Eradication
Isolation
Segmentation
Removal
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?
Eradication
Isolation
Segmentation
Removal
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?
Sandbox
Playpen
IDS
DLP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?
Identifying the source of the attack
Eradication
Containment
Recovery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following activities does CompTIA classify as part of the recovery validation effort?
Rebuilding systems
Sanitization
Secure disposal
Scanning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?