Containment, Eradication, and Recovery

Containment, Eradication, and Recovery

University

19 Qs

quiz-placeholder

Similar activities

Accident Investigation

Accident Investigation

University - Professional Development

20 Qs

IBM Digital transformation sept23

IBM Digital transformation sept23

University

20 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

CHAPTER 8: PERFORMANCE MANAGEMENT AND APPRAISAL

CHAPTER 8: PERFORMANCE MANAGEMENT AND APPRAISAL

University

15 Qs

HSE OA101

HSE OA101

University

15 Qs

Electrical 1 Week 3

Electrical 1 Week 3

University

15 Qs

IECEP - EST Day 3

IECEP - EST Day 3

University

17 Qs

Day 3 Assessment TOT on IPM Batch 2

Day 3 Assessment TOT on IPM Batch 2

1st Grade - Professional Development

15 Qs

Containment, Eradication, and Recovery

Containment, Eradication, and Recovery

Assessment

Quiz

Professional Development

University

Hard

Created by

Saniya Berzhanova

Used 4+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?

Containment, Eradication, and Recovery

Preparation

Postincident Activity

Detection and Analysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?

Effectiveness of the strategy

Evidence preservation requirements

Log records generated by the strategy

Cost of the strategy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?

Eradication

Isolation

Segmentation

Removal

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?

Eradication

Isolation

Segmentation

Removal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?

Sandbox

Playpen

IDS

DLP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?

Identifying the source of the attack

Eradication

Containment

Recovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following activities does CompTIA classify as part of the recovery validation effort?

Rebuilding systems

Sanitization

Secure disposal

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?