Search Header Logo

Containment, Eradication, and Recovery

Authored by Saniya Berzhanova

Professional Development

University

Used 4+ times

Containment, Eradication, and Recovery
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?

Containment, Eradication, and Recovery

Preparation

Postincident Activity

Detection and Analysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?

Effectiveness of the strategy

Evidence preservation requirements

Log records generated by the strategy

Cost of the strategy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?

Eradication

Isolation

Segmentation

Removal

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?

Eradication

Isolation

Segmentation

Removal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?

Sandbox

Playpen

IDS

DLP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?

Identifying the source of the attack

Eradication

Containment

Recovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following activities does CompTIA classify as part of the recovery validation effort?

Rebuilding systems

Sanitization

Secure disposal

Scanning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?