Back to Freecodecamp

Task 159

curriculum/challenges/english/blocks/learn-how-to-use-modal-verbs/67d8528b25167eabc28c8800.md

latest1.9 KB
Original Source
<!-- READING -->

--instructions--

Read the text and answer the question below.

--questions--

--text--

Jake decided to email the security team to inform them about a recent security breach and request their assistance in the investigation.

Subject: URGENT. Security Breach Investigation in Progress

Hi team,

We detected unusual activity on our internal network last night, indicating a potential security breach. While reviewing the logs, we found a high volume of traffic from a specific IP address, which suggests a targeted attack. At this point, we are unsure how they got past our firewall, but we are investigating whether an open port or another vulnerability was exploited.

Our immediate steps are:

1. Isolating affected systems to prevent further access.

2. Running a full security scan to assess the extent of the breach.

3. Reviewing access logs to determine which files or systems were compromised.

Please prioritize this investigation and report any findings as soon as possible. If you notice anything unusual in the logs or have any insights, let me know immediately.

Thanks,

Jake

Why does Jake mention an open port or another vulnerability?

--answers--

He wants to close all open ports immediately.

--feedback--

Jake is still investigating and has not decided to close all ports yet.


He believes the attacker used stolen passwords.

--feedback--

Jake does not mention stolen credentials.


He is investigating how the attacker bypassed the firewall.


He is reporting that the issue has been resolved.

--feedback--

Jake is still investigating the breach, not confirming that it has been fixed.

--video-solution--

3

--explanation--

Jake suspects that the attacker may have exploited an open port or another vulnerability to bypass the firewall. He is looking into how the security defenses were breached.

Focus on how firewall weaknesses can be used as entry points for attackers.