Back to Freecodecamp

Task 160

curriculum/challenges/english/blocks/learn-how-to-use-modal-verbs/67d8543d40213fac668af823.md

latest2.2 KB
Original Source
<!-- READING -->

--instructions--

Read the text and answer the question below.

--questions--

--text--

Jake decided to email the security team to inform them about a recent security breach and request their assistance in the investigation.

Subject: URGENT. Security Breach Investigation in Progress

Hi team,

We detected unusual activity on our internal network last night, indicating a potential security breach. While reviewing the logs, we found a high volume of traffic from a specific IP address, which suggests a targeted attack. At this point, we are unsure how they got past our firewall, but we are investigating whether an open port or another vulnerability was exploited.

Our immediate steps are:

1. Isolating affected systems to prevent further access.

2. Running a full security scan to assess the extent of the breach.

3. Reviewing access logs to determine which files or systems were compromised.

Please prioritize this investigation and report any findings as soon as possible. If you notice anything unusual in the logs or have any insights, let me know immediately.

Thanks,

Jake

What are the three immediate steps the team is taking to handle the breach?

--answers--

Changing all employee passwords, updating firewalls, and resetting servers.

--feedback--

These are good security measures, but Jake's email lists different immediate actions.


Shutting down the entire network, calling law enforcement, and restoring backups.

--feedback--

Jake is focusing on containing and investigating the breach, not shutting everything down.


Blocking all external IP addresses, encrypting all files, and limiting user access.

--feedback--

Jake's email lists different immediate actions.


Isolating affected systems, running a full security scan, and reviewing access logs.

--video-solution--

4

--explanation--

Jake outlines three immediate steps:

Isolating affected systems to prevent further access.

Running a full security scan to assess the extent of the breach.

Reviewing access logs to determine which files or systems were compromised.

Focus on how these steps help contain the attack and identify vulnerabilities.