CO2517

CO2517

University

25 Qs

quiz-placeholder

Similar activities

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

Cybersecurity Essentials Chapter 6 Review

Cybersecurity Essentials Chapter 6 Review

9th Grade - University

20 Qs

Understand how to manage cyber security incidents

Understand how to manage cyber security incidents

5th Grade - University

22 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Security

Security

University - Professional Development

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

CHAPTER 1 - Review Quiz

CHAPTER 1 - Review Quiz

University

20 Qs

CHFI Module 4 Review

CHFI Module 4 Review

University

20 Qs

CO2517

CO2517

Assessment

Quiz

Computers

University

Medium

Created by

Christopher Finnigan

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of these is NOT part of the ACPO guidelines

 That no action take is taken that should change data held on a digital device including a computer or mobile phone that may subsequently be relied upon as evidence in court

Where a person finds it necessary to access original data held on a digital device that the person must be competent to do so and able to explain their actions and the implications of those actions on the digital evidence to a Court.

That a trail or record of all actions taken that have been applied to the digital evidence should be created and preserved. An independent third party forensic expert should be able to examine those processes and reach the same conclusion.

That the individual in charge of the investigation has overall responsibility to ensure that these principles are followed.

The evidence must prove that there is a conviction of guilty

Answer explanation

There is no seeking to convict or nor bias throughout the investigation, you are seeking to discover evidence of an event and its associated data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is an Event?

Anything that happens on our network

Something that damages our network

Anything that triggers a response from our servers

Answer explanation

Events happen all the time on networks and in life.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a Security Incident?

Anything we believe might be on our network

Only items that are logged as harmful

Any event we know or suspect adverse to our network

Only something defined in our Response Plan

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

A disruption of service on your network could be considered a

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

an authenticated student accessing their files via ssh, is a

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

A student logging into our system correctly could be considered either an incident or an event, which is it?

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Malware could be considered either an incident or an event , which is it?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?