Importance of Logs
Assessment
•
Isabella S
•
Instructional Technology
•
Professional Development
•
9 plays
•
Medium
Improve your activity
Higher order questions
Match
•
Reorder
•
Categorization
actions
Add similar questions
Add answer explanations
Translate quiz
Tag questions with standards
More options
15 questions
Show answers
1.
Multiple Choice
What is an adversary's attempt to map out its target(s)?
Enumeration
Exploitation
Post exploitation
Data exfiltration
2.
Multiple Choice
What is an initial intrusion into the target's systems?
Enumeration
Exploitation
Post exploitation
Data exfiltration
3.
Multiple Choice
What is it called, activities that serve to strengthen the attacker's position in the systems, such as installing a backdoor, or privilege escalation?
Enumeration
Exploitation
Post exploitation
Data exfiltration
4.
Multiple Choice
What is smuggling data out of the victim's systems?
Enumeration
Exploitation
Post exploitation
Data exfiltration
5.
Multiple Choice
Which of the following is NOT a reason to log data?
Monitoring policy violations
Monitoring business processes
Monitoring application performance
Providing information about problems and unusual conditions in systems and applications
Deleting audit trails
6.
Multiple Choice
Which of the followings should be included in logs?
Passwords, access tokens and other authentication strings
Encryption keys and secret tokens
Sensitive personal data
Application source code
Login attempts outside of working hours
Explore this activity with a free account
Find a similar activity
Create activity tailored to your needs using
Parts of Computer
•
1st Grade
Network Topology
•
University
Computer Hardware
•
6th - 7th Grade
Storage Capacity of Computers
•
KG - 4th Grade
Computer Use Expectations
•
9th - 12th Grade
Cybersecurity
•
10th - 12th Grade
Digital Literacy
•
12th Grade