Back to Freecodecamp

Task 108

curriculum/challenges/english/blocks/learn-about-speculation-and-requests/67f52d066a653223b0cbc15f.md

latest2.3 KB
Original Source
<!-- READING -->

--instructions--

Read the text and answer the question below.

--questions--

--text--

Jessica found something unusual and decided to inform Jake and the incident response team. Here's her email:

Subject: Urgent: Unusual Activity Detected – Security Investigation

Hi team,

I was reviewing the logs from last night's reported security breach and noticed some unusual activity. While all security updates appear to be applied, I found odd patterns in the audit logs that could be related to the incident. I haven't confirmed the cause yet, but there is a possibility of a phishing attack, as we received reports of a suspicious email.

We should also check for:

1. Unauthorized access attempts – There might be failed logins or unusual access from external IPs.

2. Weak passwords or shared credentials – This could have been exploited.

3. Firewall configurations – There might be a misconfiguration allowing unauthorized traffic.

4. Signs of brute force or SQL injection attacks – These should be investigated further.

I'm also reaching out to the team to see if anyone noticed anything suspicious. If we find more signs of unauthorized access, we may need to escalate the situation. I'll keep you updated as I gather more information.

Let me know if you find anything on your end.

Best,

Jessica

What are the four security risks Jessica mentions that need to be checked?

--answers--

Software bugs, missing updates, expired certificates, and slow performance.

--feedback--

Jessica does not mention software bugs or performance issues — she focuses on security risks.


Insider threats, internet speed issues, old hardware, and power outages.

--feedback--

These are workplace concerns, but they are not the security risks Jessica mentions.


Deleted data, incorrect usernames, long loading times, and email spam.

--feedback--

Jessica is investigating security threats, not performance or usability issues.


Unauthorized access attempts, weak passwords, firewall configurations, and brute force or SQL injection attacks.

--video-solution--

4

--explanation--

Jessica lists four key security risks that should be checked.

Look for the security risks related to access attempts, credentials, system configurations, and common types of cyberattacks that Jessica mentions in her email.