Root Cause Analysis in Cybersecurity

Root Cause Analysis in Cybersecurity

Assessment

Interactive Video

Computers

10th - 12th Grade

Hard

Created by

Emma Peterson

FREE Resource

The video tutorial by Toby from Oline Security covers a root cause analysis of a security breach. It begins with an introduction to the lab, followed by logging into systems and gathering initial data. The tutorial then delves into analyzing security events to identify anomalies, tracing the attack path, and understanding how the system was compromised through phishing and proxy setup. The video concludes with network and proxy analysis, reviewing packet captures, and summarizing the findings.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of the lab introduced in the video?

Learning about network configurations

Performing a root cause analysis

Setting up a new security system

Understanding basic programming concepts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is used to investigate security events in the lab?

Metasploit

Wazo

Wireshark

Nmap

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the significant change observed in the audit policies?

Network traffic was encrypted

New user accounts were created

Successful and failed events were no longer logged

Firewall rules were modified

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which user was identified as having made changes to the audit policy?

Admin

Jamie

Toby

Dylan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of connection did Jamie use to access the domain controller?

SSH

VPN

Remote Desktop Protocol (RDP)

Telnet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who was found to have used Jamie's credentials for the RDP session?

Jamie

Dylan

Admin

Toby

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did Dylan gain access to Jamie's credentials?

By guessing the password

Via a phishing email

By exploiting a software vulnerability

Through a brute force attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?