
Importance of Logs
Authored by Isabella S
Instructional Technology
Professional Development
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an adversary's attempt to map out its target(s)?
Enumeration
Exploitation
Post exploitation
Data exfiltration
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an initial intrusion into the target's systems?
Enumeration
Exploitation
Post exploitation
Data exfiltration
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is it called, activities that serve to strengthen the attacker's position in the systems, such as installing a backdoor, or privilege escalation?
Enumeration
Exploitation
Post exploitation
Data exfiltration
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is smuggling data out of the victim's systems?
Enumeration
Exploitation
Post exploitation
Data exfiltration
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is NOT a reason to log data?
Monitoring policy violations
Monitoring business processes
Monitoring application performance
Providing information about problems and unusual conditions in systems and applications
Deleting audit trails
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the followings should be included in logs?
Passwords, access tokens and other authentication strings
Encryption keys and secret tokens
Sensitive personal data
Application source code
Login attempts outside of working hours
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Logs may reveal bugs and unusual behavior in applications.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?