Cybersecurity Investigation Techniques

Cybersecurity Investigation Techniques

Assessment

Interactive Video

Computers, Professional Development, Education

10th Grade - University

Hard

Created by

Aiden Montgomery

FREE Resource

In this final lab of the Security Plus 701 series, Toby from Oine Security guides viewers through a challenge lab focused on network traffic analysis and threat mitigation. Using tools like Wireshark and Security Onion, the tutorial demonstrates how to identify and analyze suspicious network activity, such as unauthorized data transmission and account creation. The video emphasizes the importance of thorough investigation, note-taking, and repeated practice to master cybersecurity skills. It concludes with a call to action for viewers to engage with Oine Security's courses for further learning and professional development.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to take notes and revisit the video content multiple times?

To become proficient with the tools and skills

To avoid watching the video again

To impress the instructor

To memorize the content

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is used to open the traffic file in the investigation?

Task Manager

Wireshark

Event Viewer

Security Onion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to display the active connections and ports on Windows Server?

netstat

ping

ipconfig

tasklist

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What anomaly was found in the Windows Server during the investigation?

A disabled service

An unauthorized user account

A missing file

A corrupted registry

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to examine Windows Server security logs?

Event Viewer

Wireshark

Task Manager

Security Onion

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of data was identified as being exfiltrated in the TCP stream?

Financial data

Personal Identifiable Information (PII)

Health records

Credit card information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action is recommended to mitigate unauthorized accounts?

Ignore the account

Disable the account

Delete the account

Rename the account

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?