Scope chapter quiz

Quiz

Scope chapter quiz

Pick the answer that best matches the methodology.

A confirmed compromise of a system processing payment card data is detected. The technical investigation will take days. What does Scope require the analyst to do about timing?

An alert looks like phishing-driven intrusion. What is the typical historical window for the investigation?

The Subject phase identified seven identities connected to the alert. How many should be primary in scope?

An investigation needs in-app activity from a SaaS platform, but the SOC only has authentication logs and gross API metrics. What does Scope require?

A HIPAA investigation hits Tier 3 (full PHI access). What approval is required, and how long does access last?

During Scope, the analyst confirms that a compromised account assumed a cloud role during the investigation window. The decision-tree response is...

A PCI investigation requires de-tokenized cardholder data samples. Which tier of access is appropriate, and what controls apply?

The Scope handoff to Uncover should include investigative questions. Why?

Need a nudge?

Think about what makes the difference between focused triage and unstructured exploration.

Next up

Transition to Uncover

Continue