Back to Freecodecamp

Task 109

curriculum/challenges/english/blocks/learn-about-speculation-and-requests/67f52dee33807524435b5714.md

latest2.3 KB
Original Source
<!-- READING -->

--instructions--

Read the text and answer the question below.

--questions--

--text--

Jessica found something unusual and decided to inform Jake and the incident response team. Here's her email:

Subject: Urgent: Unusual Activity Detected – Security Investigation

Hi team,

I was reviewing the logs from last night's reported security breach and noticed some unusual activity. While all security updates appear to be applied, I found odd patterns in the audit logs that could be related to the incident. I haven't confirmed the cause yet, but there is a possibility of a phishing attack, as we received reports of a suspicious email.

We should also check for:

1. Unauthorized access attempts – There might be failed logins or unusual access from external IPs.

2. Weak passwords or shared credentials – This could have been exploited.

3. Firewall configurations – There might be a misconfiguration allowing unauthorized traffic.

4. Signs of brute force or SQL injection attacks – These should be investigated further.

I'm also reaching out to the team to see if anyone noticed anything suspicious. If we find more signs of unauthorized access, we may need to escalate the situation. I'll keep you updated as I gather more information.

Let me know if you find anything on your end.

Best,

Jessica

What might happen if more signs of unauthorized access are found?

--answers--

The situation may need to be escalated.


Jessica will reset all employee passwords.

--feedback--

Jessica has not mentioned resetting passwords yet — she is still gathering information.


The security team will stop the investigation.

--feedback--

If more signs of unauthorized access are found, the investigation will likely expand, not stop.


Jessica will turn off the company servers.

--feedback--

Jessica does not mention shutting down servers — she focuses on identifying and responding to the breach.

--video-solution--

1

--explanation--

Jessica states that if they find more signs of unauthorized access, they may need to escalate the situation. This means the security team may need to take stronger action, such as reporting to management or enforcing additional security measures.

Focus on the sentence that starts with If we find more signs....