Search Header Logo

CO2517

Authored by Christopher Finnigan

Computers

University

Used 1+ times

CO2517
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of these is NOT part of the ACPO guidelines

 That no action take is taken that should change data held on a digital device including a computer or mobile phone that may subsequently be relied upon as evidence in court

Where a person finds it necessary to access original data held on a digital device that the person must be competent to do so and able to explain their actions and the implications of those actions on the digital evidence to a Court.

That a trail or record of all actions taken that have been applied to the digital evidence should be created and preserved. An independent third party forensic expert should be able to examine those processes and reach the same conclusion.

That the individual in charge of the investigation has overall responsibility to ensure that these principles are followed.

The evidence must prove that there is a conviction of guilty

Answer explanation

There is no seeking to convict or nor bias throughout the investigation, you are seeking to discover evidence of an event and its associated data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is an Event?

Anything that happens on our network

Something that damages our network

Anything that triggers a response from our servers

Answer explanation

Events happen all the time on networks and in life.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a Security Incident?

Anything we believe might be on our network

Only items that are logged as harmful

Any event we know or suspect adverse to our network

Only something defined in our Response Plan

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

A disruption of service on your network could be considered a

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

an authenticated student accessing their files via ssh, is a

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

A student logging into our system correctly could be considered either an incident or an event, which is it?

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Malware could be considered either an incident or an event , which is it?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?