
Blue Team Assesment
Authored by Onasor Group
Specialty
1st Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
Why are log files important for an organization to detect and investigate cyber incidents?
For performance monitoring
For backups
To detect and respond to security incidents
To archive the organization's history
2.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
Which files contains user's password hashes on Linux?
/var/log/auth.log
/etc/passwd
/etc/shadow
iptables.log
3.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
What is the function of a firewall?
Cleans malware
Monitors and controls network traffic
Speeds up data transfer between computers
Provides email security
4.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
What does an "Intrusion Detection System (IDS)" monitor to prevent unauthorized access to a network?
Network traffic and detects attacks
finds missing patches
Encrypts email messages
Implements system updates
5.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
Why is incident response important in cybersecurity?
For training purposes
To update web browsers
To respond quickly to cyberattacks
To increase network speed
6.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
What does network security monitoring help organizations track?
System performance
User activities
Log data
Weather conditions
7.
MULTIPLE CHOICE QUESTION
1 min • 11 pts
What type of application attack is SQL injection an example of?
DoS attack
Ransomware attack
XSS (Cross-Site Scripting) attack
Database security attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?