No student devices needed. Know more
15 questions
What is an adversary's attempt to map out its target(s)?
Enumeration
Exploitation
Post exploitation
Data exfiltration
What is an initial intrusion into the target's systems?
Enumeration
Exploitation
Post exploitation
Data exfiltration
What is it called, activities that serve to strengthen the attacker's position in the systems, such as installing a backdoor, or privilege escalation?
Enumeration
Exploitation
Post exploitation
Data exfiltration
What is smuggling data out of the victim's systems?
Enumeration
Exploitation
Post exploitation
Data exfiltration
Which of the following is NOT a reason to log data?
Monitoring policy violations
Monitoring business processes
Monitoring application performance
Providing information about problems and unusual conditions in systems and applications
Deleting audit trails
Which of the followings should be included in logs?
Passwords, access tokens and other authentication strings
Encryption keys and secret tokens
Sensitive personal data
Application source code
Login attempts outside of working hours
Logs may reveal bugs and unusual behavior in applications.
True
False
Logs can be used to investigate past security breaches.
True
False
Log monitoring helps detect and prevent security breaches.
True
False
Logging and log monitoring is not that important
True
False
There may be a legal requirement to log information in certain industries, such as banking and healthcare. And that is why logging is important for these industries.
True
False
Log monitoring can help detect automation scripts that are used to interact with your application.
True
False
By publishing all your logs in a publicly readable central archive, you can increase the public's trust in your application.
True
False
Logs can reveal policy violations.
True
False
How do you feel this week?
Explore all questions with a free account