25. Incident Response Quiz

25. Incident Response Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Noom day 4 | Service request 2.0

Noom day 4 | Service request 2.0

Professional Development

14 Qs

Digital Citizenship Quiz

Digital Citizenship Quiz

KG - Professional Development

15 Qs

CCNA Intro

CCNA Intro

Professional Development

15 Qs

Phishing & Centra Cyber Security

Phishing & Centra Cyber Security

Professional Development

12 Qs

Noom | Day 4 - Service request

Noom | Day 4 - Service request

Professional Development

17 Qs

Computer viruses and Windows Operating system

Computer viruses and Windows Operating system

Professional Development

16 Qs

25. Incident Response Quiz

25. Incident Response Quiz

Assessment

Interactive Video

Professional Development

Professional Development

Hard

Created by

Jennifer Clark

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What phase of the incident response process is focused on in this lab?

Preparation

Detection

Eradication

Containment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to add the word 'password' to the 57th line of a file?

grep

awk

cat

sed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the file where the password list is saved?

pass.txt

passlist.txt

password_list.txt

passwords.txt

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default username for logging into the Wazoo platform?

admin

user

guest

root

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which IP address is used to access the Wazoo platform?

10.1.1.16242

172.16.0.1

192.168.1.1

10.0.0.1

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is used to conduct a password attack in this lab?

Hydra

John the Ripper

Nmap

Metasploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is targeted by Hydra in the password attack?

FTP

SSH

RDP

HTTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?