0
0
Cybersecurityknowledge~20 mins

Containment strategies in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
πŸŽ–οΈ
Containment Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding containment strategy types

Which of the following best describes a segmentation containment strategy in cybersecurity?

ABacking up data regularly to restore systems after an attack
BCompletely shutting down all network connections to stop an attack immediately
CUsing antivirus software to detect and remove malware from infected devices
DSeparating network segments to limit the spread of an attack within different parts of the network
Attempts:
2 left
πŸ’‘ Hint

Think about how dividing a network can help control where an attacker can go.

πŸ“‹ Factual
intermediate
2:00remaining
Key goal of containment strategies

What is the primary goal of containment strategies during a cybersecurity incident?

ATo identify the attacker’s identity quickly
BTo limit the damage and prevent the attack from spreading further
CTo immediately restore all affected systems to normal operation
DTo delete all data on infected devices
Attempts:
2 left
πŸ’‘ Hint

Containment focuses on controlling the incident, not on recovery or identification.

πŸ” Analysis
advanced
2:00remaining
Choosing the right containment method

A company detects malware spreading through its internal network. Which containment method is most appropriate to stop the malware while keeping most services running?

AIgnore the malware and continue normal operations to avoid disruption
BShut down the entire network immediately to stop all activity
CIsolate infected devices from the network but keep other segments operational
DDelete all user accounts to prevent access
Attempts:
2 left
πŸ’‘ Hint

Think about how to stop the malware without stopping everything.

❓ Comparison
advanced
2:00remaining
Comparing containment strategies

Which statement correctly compares physical containment and logical containment in cybersecurity?

APhysical containment involves hardware isolation, while logical containment uses software controls like firewalls and access rules
BPhysical containment is faster to implement than logical containment in all cases
CBoth physical and logical containment mean disconnecting the internet connection
DPhysical containment uses software firewalls, and logical containment disconnects cables physically
Attempts:
2 left
πŸ’‘ Hint

Consider the difference between hardware and software methods.

❓ Reasoning
expert
2:00remaining
Evaluating containment effectiveness

During a ransomware attack, a company applies containment by disconnecting affected systems from the network. However, the ransomware still encrypts files on disconnected devices. What does this indicate about the containment strategy?

AContainment was partially effective but failed to stop local encryption on devices
BContainment completely failed because the network was disconnected
CContainment was unnecessary since encryption happens only over the network
DContainment caused the ransomware to spread faster
Attempts:
2 left
πŸ’‘ Hint

Think about what containment can and cannot stop.