Security Operations Playbook Assessment

Security Operations Playbook Assessment

Assessment

Interactive Video

Computers, Professional Development

10th - 12th Grade

Practice Problem

Hard

Created by

Mia Campbell

FREE Resource

The video tutorial by Toby from Alline Security covers the use of playbooks in security PL 701 labs. It explains what a playbook is and demonstrates how to execute it using different methods like GUI, CLI, and third-party tools. The tutorial walks through steps such as investigating high CPU usage, terminating processes, hashing files, performing malware analysis, archiving files, transferring them to quarantine, and finally removing suspicious files. It concludes with creating an after-action report and emphasizes the importance of playbooks in guiding security analysts through incident response processes.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a playbook in security operations?

To document all network traffic

To provide a step-by-step process for resolving incidents

To automate all security tasks

To replace security analysts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool was used first to identify the high CPU usage process?

Process Explorer

Task Manager

Command Prompt

PowerShell

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the name of the process causing high CPU usage?

HeavyLoad

LightLoad

CPUHog

MemoryEater

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used in the command prompt to list all running processes?

tasklist

ps

showproc

listproc

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of hashing a file in the context of this lab?

To analyze the file for malware

To identify the file's owner

To verify the file's integrity

To encrypt the file

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which online tool was used to analyze the malware hash?

McAfee

Norton

MalwareBytes

VirusTotal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who was identified as the owner of the suspicious file?

Admin

Guest

Root

User

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers