
Containment, Eradication, and Recovery
Quiz
•
Professional Development
•
University
•
Practice Problem
•
Hard

Saniya Berzhanova
Used 4+ times
FREE Resource
Enhance your content in a minute
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the phases of incident response involves primarily active undertakings designed to limit the damage that an attacker might cause?
Containment, Eradication, and Recovery
Preparation
Postincident Activity
Detection and Analysis
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following criteria is not normally used when evaluating the appropriateness of a cybersecurity incident containment strategy?
Effectiveness of the strategy
Evidence preservation requirements
Log records generated by the strategy
Cost of the strategy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?
Eradication
Isolation
Segmentation
Removal
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Alice confers with other team members and decides that even allowing limited access to other systems is an unacceptable risk and decides instead to prevent the quarantine VLAN from accessing any other systems by putting firewall rules in place that limit access to other enterprise systems. The attacker can still control the system to allow Alice to continue monitoring the incident. What strategy is she now pursuing?
Eradication
Isolation
Segmentation
Removal
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following tools may be used to isolate an attacker so that they may not cause damage to production systems but may still be observed by cybersecurity analysts?
Sandbox
Playpen
IDS
DLP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tamara is a cybersecurity analyst for a private business that is suffering a security breach. She believes the attackers have compromised a database containing sensitive information. Which one of the following activities should be Tamara's first priority?
Identifying the source of the attack
Eradication
Containment
Recovery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following activities does CompTIA classify as part of the recovery validation effort?
Rebuilding systems
Sanitization
Secure disposal
Scanning
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Business Analytics and Data Mining
Quiz
•
University
20 questions
REVISION 4 : TOPIC 9 [ACCOUNTING FOR NON-CURRENT ASSETS]
Quiz
•
1st Grade - University
20 questions
Low of average
Quiz
•
University
15 questions
Malayan Trademark
Quiz
•
University
15 questions
Labor Relations and Negotations 1
Quiz
•
University - Professi...
15 questions
Psychological Perspective
Quiz
•
University
14 questions
Tort Law Q1
Quiz
•
University
15 questions
NFPA 25 5.4 review quiz
Quiz
•
University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
