curriculum/challenges/english/blocks/learn-how-to-use-modal-verbs/67d851f498ef2cab397ec69c.md
Read the text and answer the question below.
Jake decided to email the security team to inform them about a recent security breach and request their assistance in the investigation.
Subject: URGENT. Security Breach Investigation in Progress
Hi team,
We detected unusual activity on our internal network last night, indicating a potential security breach. While reviewing the logs, we found a high volume of traffic from a specific IP address, which suggests a targeted attack. At this point, we are unsure how they got past our firewall, but we are investigating whether an open port or another vulnerability was exploited.
Our immediate steps are:
1. Isolating affected systems to prevent further access.
2. Running a full security scan to assess the extent of the breach.
3. Reviewing access logs to determine which files or systems were compromised.
Please prioritize this investigation and report any findings as soon as possible. If you notice anything unusual in the logs or have any insights, let me know immediately.
Thanks,
Jake
What does the high volume of traffic from a specific IP address suggest?
A targeted attack
An internal system update
System updates generate expected traffic, but Jake describes unusual activity from an unknown source.
A firewall upgrade
A firewall upgrade would not create a suspicious traffic pattern.
A routine server backup
Backups are normal operations, while Jake is investigating a security breach.
1
Jake notes that the high volume of traffic from a specific IP address suggests a targeted attack. This means someone may have deliberately attempted to gain unauthorized access to the system.
Focus on how suspicious network activity can indicate cyber threats.