Search Header Logo

Incident Response

Authored by Olabisi Olajide

Information Technology (IT)

Professional Development

Used 2+ times

Incident Response
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

During a memory analysis, which three critical points should be examined to identify potential threats?

Process Tree

File Fragmentation

Network Connections

Signature Status

2.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Which two Windows Event IDs are important to check when monitoring user account creation and additions to security-enabled local groups?

Event ID 4720

Event ID 4689

Event ID 4732

Event ID 4270

3.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Which security event logs would you check to monitor the creation and modification of scheduled tasks?

Event ID 4698

Event ID 4672

Event ID 4220

Eventy ID 4702

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following can be used to reinfect a system even if a user removes a malicious file, as it may trigger reinstallation upon reboot?

Services

Run Keys

Processes

Multiple Users Creation

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

At what stage of the NIST Incident Response process are malicious activities confirmed, and decisions are made on how to respond to them?

  • Post-Incident Activity

  • Containment, Eradication & Recovery


  • Detection & Analysis

  • Preparation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?