Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?

Containment, Eradication, and Recovery

Quiz
•
Professional Development
•
University
•
Hard

Saniya Berzhanova
Used 4+ times
FREE Resource
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Containment, Eradication, and Recovery
Preparation
Postincident Activity
Detection and Analysis
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?
Effectiveness of the strategy
Evidence preservation requirements
Log records generated by the strategy
Cost of the strategy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?
Eradication
Isolation
Segmentation
Removal
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?
Eradication
Isolation
Segmentation
Removal
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?
Sandbox
Playpen
IDS
DLP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?
Identifying the source of the attack
Eradication
Containment
Recovery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following activities does CompTIA classify as part of the recovery validation effort?
Rebuilding systems
Sanitization
Secure disposal
Scanning
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Post test safety talk materi JSA

Quiz
•
1st Grade - University
15 questions
Pre Evaluasi Onboarding

Quiz
•
University
14 questions
Quiz Pertemuan 02 (Budaya K3L di Institusi)

Quiz
•
University
15 questions
Org Management (Recitation)

Quiz
•
University
20 questions
Historical Foundations of Education

Quiz
•
University
18 questions
BCS Network Security Test 4

Quiz
•
University
22 questions
GG's WHS Incident Form

Quiz
•
University
20 questions
CySa+ PT 4: 2/3

Quiz
•
9th Grade - Professio...
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade