Importance of Logs

Importance of Logs

Professional Development

15 Qs

quiz-placeholder

Similar activities

Basic Shipping Terms

Basic Shipping Terms

Professional Development

20 Qs

CPA Prelims JY 2022

CPA Prelims JY 2022

8th Grade - Professional Development

20 Qs

(elem) Technology Routines

(elem) Technology Routines

Professional Development

18 Qs

R&S PR200 Portable MON DF

R&S PR200 Portable MON DF

Professional Development

15 Qs

IT General Control

IT General Control

Professional Development

10 Qs

2019 Hyundai Santa Fe

2019 Hyundai Santa Fe

Professional Development

15 Qs

myIMPACT Grand Finale 2022

myIMPACT Grand Finale 2022

Professional Development

15 Qs

HADIRR MOBILE APPS QUIZ!

HADIRR MOBILE APPS QUIZ!

Professional Development

11 Qs

Importance of Logs

Importance of Logs

Assessment

Quiz

Instructional Technology

Professional Development

Practice Problem

Medium

Created by

Isabella S

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an adversary's attempt to map out its target(s)?

Enumeration

Exploitation

Post exploitation

Data exfiltration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an initial intrusion into the target's systems?

Enumeration

Exploitation

Post exploitation

Data exfiltration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called, activities that serve to strengthen the attacker's position in the systems, such as installing a backdoor, or privilege escalation?

Enumeration

Exploitation

Post exploitation

Data exfiltration

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is smuggling data out of the victim's systems?

Enumeration

Exploitation

Post exploitation

Data exfiltration

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a reason to log data?

Monitoring policy violations

Monitoring business processes

Monitoring application performance

Providing information about problems and unusual conditions in systems and applications

Deleting audit trails

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the followings should be included in logs?

Passwords, access tokens and other authentication strings

Encryption keys and secret tokens

Sensitive personal data

Application source code

Login attempts outside of working hours

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Logs may reveal bugs and unusual behavior in applications.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?