Security Operations Playbook Assessment

Security Operations Playbook Assessment

Assessment

Interactive Video

Computers, Professional Development

10th - 12th Grade

Hard

Created by

Mia Campbell

FREE Resource

The video tutorial by Toby from Alline Security covers the use of playbooks in security PL 701 labs. It explains what a playbook is and demonstrates how to execute it using different methods like GUI, CLI, and third-party tools. The tutorial walks through steps such as investigating high CPU usage, terminating processes, hashing files, performing malware analysis, archiving files, transferring them to quarantine, and finally removing suspicious files. It concludes with creating an after-action report and emphasizes the importance of playbooks in guiding security analysts through incident response processes.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a playbook in security operations?

To document all network traffic

To provide a step-by-step process for resolving incidents

To automate all security tasks

To replace security analysts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool was used first to identify the high CPU usage process?

Process Explorer

Task Manager

Command Prompt

PowerShell

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the name of the process causing high CPU usage?

HeavyLoad

LightLoad

CPUHog

MemoryEater

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used in the command prompt to list all running processes?

tasklist

ps

showproc

listproc

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of hashing a file in the context of this lab?

To analyze the file for malware

To identify the file's owner

To verify the file's integrity

To encrypt the file

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which online tool was used to analyze the malware hash?

McAfee

Norton

MalwareBytes

VirusTotal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who was identified as the owner of the suspicious file?

Admin

Guest

Root

User

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?