
Cybersecurity study

Passage
•
Computers
•
University
•
Easy
Tia T
Used 1+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is offensive security?
is the process of breaking into computer systems, exploiting software bugs, and finding loopholes in applications to gain unauthorized access to them.
is the process of protecting, storing, and reporting all data necessary to help prevent or prepare for a future attack that can happen.
is the process of fighting a attack on your own with no help and not letting anyone know what you're plans are or when the attacks are happening.
is the process of keeping and storing data that is found on the computer in files or flash drives to protect all data that could possibly be erased in event of a attacker.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is defensive security?
is the process of protecting an organization's network and computer systems by analyzing and securing any potential digital threats
is the process of breaking into a computer and checking to see if there is any deleted files or data that may need to be restored or analyzed.
is the process of working with a company and stealing their information
is the process of calling an organization and letting them know that they have a potential threat situation that can become worse if not handled immediately.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
what are the two main tasks of defensive security?
Preventing intrusions from occurring
preventing viruses from spreading to certain areas of the computer and reporting it without helping.
detecting intrusions when they occur and responding properly
noticing something suspicious but waiting until anything actually happens to say something.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
what are some of the tasks that are related to defensive security?
Documenting and managing assets
Updating and patching systems
Setting up logging and monitoring devices
User cyber awareness
Setting up preventative security devices
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Consequently, digital forensics will focus on different areas such as:
Network logs
System memory
File System
System logs
It support
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
The four major phases of the incident response process are:
Detection and Analysis
Preparation
Containment, Eradication, and Recovery
Post-Incident Activity
Saving information for your own personal use
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware stands for:
malicious software
Malicious hardware
Suspicious emails
malicious files
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
Introduction to Computer System

Quiz
•
University
25 questions
Introduction to Computers

Quiz
•
University
22 questions
OSPF Protocol

Quiz
•
University - Professi...
21 questions
ISC2 - CC - Chapter 1 - Module 3

Quiz
•
University
29 questions
Digital Forensic Investigation with Autopsy

Quiz
•
University
25 questions
Round 1

Quiz
•
University
25 questions
Quiz Competition 1

Quiz
•
University
24 questions
IT Essentials Ch 4 Review - Preventive Maintenance & Trouble

Quiz
•
10th Grade - University
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade