Want to create interactive content? It’s easy in Genially!

Get started free

W4_ISSC661_Practice_video

Griky Kontent

Created on February 10, 2026

Start designing with a free template

Discover more than 1500 professional designs like these:

Practical Video

Akihabara Video

Essential Video

Video: Responsible Use of Social Media and Internet

Explainer Video: Keys to Effective Communication

Explainer Video: AI for Companies

Breaking news video

Transcript

Welcome to Week 4

Information Assurance Assessment and Evaluation Practice Activity

Select the Start button to begin

Start

Select the Listen button to play the narration for this slide

Navigation

Listen

buttons

Use the following buttons to navigate through the course content

Listen

Play the audio for the current page

hOME

nEXT

PREVIOUS

Return to the previous page

Return to the course home page

Move to the next page

home

next

previous

Select the Listen button to play the narration for this slide

Listen

You will see a multiple-choice question with four options. Select the answer you think is correct. After choosing, an audio will tell you if it’s right or wrong, and you’ll automatically move to the next page to see feedback.

Let’s begin!

home

next

previous

Select the Listen button to play the narration for this slide

Listen

You see unusual login activity and one successful login for a privileged user.

home

next

previous

Select the Listen button to play the narration for this slide

Listen

In early incident response, you prioritize containment and evidence preservation together. Waiting increases harm, over-broadcasting causes panic, and delaying containment for paperwork allows attackers more time to persist and spread.

home

next

previous

Select the Listen button to play the narration for this slide

Listen

home

next

previous

Select the Listen button to play the narration for this slide

Listen

An incident involves confirmed security impact or strong indicators of compromise that require coordinated response. The combination of repeated attempts, successful access, and persistence behavior crosses the threshold from “signal” to “action.”

home

next

previous

Select the Listen button to play the narration for this slide

Listen

During containment, a teammate suggests wiping the affected device immediately to “remove malware fast.”

home

next

previous

Select the Listen button to play the narration for this slide

Listen

Fast response matters, but uncontrolled cleanup can destroy evidence, hide attacker behavior, and reduce your ability to explain scope and impact. Isolation plus evidence preservation supports both security and accountability.

home

next

previous

Select the Listen button to play the narration for this slide

Listen

home

next

previous

Select the Listen button to play the narration for this slide

Listen

Real-time documentation protects accuracy and defensibility. It preserves what was known when decisions were made, supports coordination, and prevents confusion later when details become blurred or disputed.

home

next

previous

Select the Listen button to play the narration for this slide

Listen

Your organization struggles with slow incident response, unclear ownership, and inconsistent actions.

home

next

previous

Select the Listen button to play the narration for this slide

Listen

Readiness improves through structure: clear ownership, practiced workflows, standard playbooks, and reliable evidence capture. Tools support response, but they cannot replace coordination, training, and repeatable decision-making.

home

next

previous

Select the Listen button to play the narration for this slide

Listen

Congratulations!

You have successfully completed the practice video.

home

previous