curriculum/challenges/english/blocks/learn-about-speculation-and-requests/67f52a20d4980321a21d5b15.md
Read the text and answer the question below.
Jessica found something unusual and decided to inform Jake and the incident response team. Here's her email:
Subject: Urgent: Unusual Activity Detected – Security Investigation
Hi team,
I was reviewing the logs from last night's reported security breach and noticed some unusual activity. While all security updates appear to be applied, I found odd patterns in the audit logs that could be related to the incident. I haven't confirmed the cause yet, but there is a possibility of a phishing attack, as we received reports of a suspicious email.
We should also check for:
1. Unauthorized access attempts – There might be failed logins or unusual access from external IPs.
2. Weak passwords or shared credentials – This could have been exploited.
3. Firewall configurations – There might be a misconfiguration allowing unauthorized traffic.
4. Signs of brute force or SQL injection attacks – These should be investigated further.
I'm also reaching out to the team to see if anyone noticed anything suspicious. If we find more signs of unauthorized access, we may need to escalate the situation. I'll keep you updated as I gather more information.
Let me know if you find anything on your end.
Best,
Jessica
What unusual activity did Jessica notice in the audit logs?
A large number of deleted files.
Jessica does not mention deleted files.
A server shutdown during the night.
The email does not mention a server shutdown.
Odd patterns that could be related to the security breach.
Unauthorized access to employee emails.
Jessica suspects a phishing attack, but she has not confirmed unauthorized email access.
3
Jessica states that she found odd patterns in the audit logs while reviewing last night's reported security breach. This suggests potential suspicious activity that needs further investigation.
Focus on the first paragraph of her email.