Search Header Logo

Cybersecurity study

Authored by Tia T

Computers

University

Used 1+ times

Cybersecurity study
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is offensive security?

is the process of breaking into computer systems, exploiting software bugs, and finding loopholes in applications to gain unauthorized access to them.

is the process of protecting, storing, and reporting all data necessary to help prevent or prepare for a future attack that can happen.

is the process of fighting a attack on your own with no help and not letting anyone know what you're plans are or when the attacks are happening.

is the process of keeping and storing data that is found on the computer in files or flash drives to protect all data that could possibly be erased in event of a attacker.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is defensive security?

is the process of protecting an organization's network and computer systems by analyzing and securing any potential digital threats

is the process of breaking into a computer and checking to see if there is any deleted files or data that may need to be restored or analyzed.

is the process of working with a company and stealing their information

is the process of calling an organization and letting them know that they have a potential threat situation that can become worse if not handled immediately.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are the two main tasks of defensive security?

Preventing intrusions from occurring

preventing viruses from spreading to certain areas of the computer and reporting it without helping.

detecting intrusions when they occur and responding properly

noticing something suspicious but waiting until anything actually happens to say something.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are some of the tasks that are related to defensive security?

Documenting and managing assets

Updating and patching systems

Setting up logging and monitoring devices

User cyber awareness

Setting up preventative security devices

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Consequently, digital forensics will focus on different areas such as:

Network logs

System memory

File System

System logs

It support

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The four major phases of the incident response process are:

Detection and Analysis

Preparation

Containment, Eradication, and Recovery

Post-Incident Activity

Saving information for your own personal use

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware stands for:

malicious software

Malicious hardware

Suspicious emails

malicious files

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?