curriculum/challenges/english/blocks/learn-about-speculation-and-requests/67f50607928b370c11239532.md
Listen to the audio and answer the question below.
What is Jake also proposing to check?
If the firewall rules are always correct.
Jake is not talking about checking firewall rule accuracy.
If Jessica's password is weak.
Jake is not focusing on individual passwords.
If all employees received a security email.
Jake is not checking employee communication.
If there's any evidence of cyberattack attempts.
4
Evidence of means signs or proof that something has happened. For example:
The report showed evidence of user error. - The report showed that a person made a mistake.
A brute force attack is when someone tries many different passwords until one works.
An SQL injection is when someone tries to break into a system by putting harmful code into a search box or form.
Jake is talking about checking for signs of these types of attacks.
{
"setup": {
"background": "company2-center.png",
"characters": [
{
"character": "Jake",
"position": {
"x": 50,
"y": 0,
"z": 1.4
},
"opacity": 0
}
],
"audio": {
"filename": "B1_17-2.mp3",
"startTime": 1,
"startTimestamp": 59,
"finishTimestamp": 64.24
}
},
"commands": [
{
"character": "Jake",
"opacity": 1,
"startTime": 0
},
{
"character": "Jake",
"startTime": 1,
"finishTime": 6.24,
"dialogue": {
"text": "We should also check to see if there's any evidence of brute force attacks or SQL injection attempts.",
"align": "center"
}
},
{
"character": "Jake",
"opacity": 0,
"startTime": 6.74
}
]
}