Search Header Logo
Cybersecurity Investigation Techniques

Cybersecurity Investigation Techniques

Assessment

Interactive Video

Computers, Professional Development, Education

10th Grade - University

Practice Problem

Hard

Created by

Aiden Montgomery

FREE Resource

In this final lab of the Security Plus 701 series, Toby from Oine Security guides viewers through a challenge lab focused on network traffic analysis and threat mitigation. Using tools like Wireshark and Security Onion, the tutorial demonstrates how to identify and analyze suspicious network activity, such as unauthorized data transmission and account creation. The video emphasizes the importance of thorough investigation, note-taking, and repeated practice to master cybersecurity skills. It concludes with a call to action for viewers to engage with Oine Security's courses for further learning and professional development.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to take notes and revisit the video content multiple times?

To become proficient with the tools and skills

To avoid watching the video again

To impress the instructor

To memorize the content

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is used to open the traffic file in the investigation?

Task Manager

Wireshark

Event Viewer

Security Onion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to display the active connections and ports on Windows Server?

netstat

ping

ipconfig

tasklist

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What anomaly was found in the Windows Server during the investigation?

A disabled service

An unauthorized user account

A missing file

A corrupted registry

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to examine Windows Server security logs?

Event Viewer

Wireshark

Task Manager

Security Onion

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of data was identified as being exfiltrated in the TCP stream?

Financial data

Personal Identifiable Information (PII)

Health records

Credit card information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action is recommended to mitigate unauthorized accounts?

Ignore the account

Disable the account

Delete the account

Rename the account

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?