Importance of Logs

Importance of Logs

Professional Development

15 Qs

quiz-placeholder

Similar activities

Sec+ Domain 1.1

Sec+ Domain 1.1

Professional Development

12 Qs

Google Professional Architect 2 - 21 to 40

Google Professional Architect 2 - 21 to 40

Professional Development

20 Qs

Google Professional Architect 9 - 161 to 180

Google Professional Architect 9 - 161 to 180

Professional Development

20 Qs

Google Professional Architect 5 - 81 to 100

Google Professional Architect 5 - 81 to 100

Professional Development

20 Qs

Google Professional Architect 7 - 121 to 140

Google Professional Architect 7 - 121 to 140

Professional Development

20 Qs

Google Professional Architect 10 - 181 to 197

Google Professional Architect 10 - 181 to 197

Professional Development

17 Qs

BPES In-Service Training (Day 3)

BPES In-Service Training (Day 3)

Professional Development

15 Qs

AWS Restart Quiz 4 monitoramento

AWS Restart Quiz 4 monitoramento

Professional Development

10 Qs

Importance of Logs

Importance of Logs

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Isabella S

Used 9+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an adversary's attempt to map out its target(s)?

Enumeration

Exploitation

Post exploitation

Data exfiltration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an initial intrusion into the target's systems?

Enumeration

Exploitation

Post exploitation

Data exfiltration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called, activities that serve to strengthen the attacker's position in the systems, such as installing a backdoor, or privilege escalation?

Enumeration

Exploitation

Post exploitation

Data exfiltration

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is smuggling data out of the victim's systems?

Enumeration

Exploitation

Post exploitation

Data exfiltration

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a reason to log data?

Monitoring policy violations

Monitoring business processes

Monitoring application performance

Providing information about problems and unusual conditions in systems and applications

Deleting audit trails

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the followings should be included in logs?

Passwords, access tokens and other authentication strings

Encryption keys and secret tokens

Sensitive personal data

Application source code

Login attempts outside of working hours

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Logs may reveal bugs and unusual behavior in applications.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?