Cybersecurity study

Cybersecurity study

University

25 Qs

quiz-placeholder

Similar activities

Day 3 Quiz

Day 3 Quiz

University

25 Qs

VIPS TECH X

VIPS TECH X

University

30 Qs

Day 2 Quiz

Day 2 Quiz

University

24 Qs

Digital Marketing

Digital Marketing

University - Professional Development

21 Qs

Computer basics

Computer basics

University

25 Qs

Digital Media, Ubiquitous Tech & IoT

Digital Media, Ubiquitous Tech & IoT

University

25 Qs

5 sem 2024 AI Elective

5 sem 2024 AI Elective

University

25 Qs

Bioinformatics

Bioinformatics

University

30 Qs

Cybersecurity study

Cybersecurity study

Assessment

Passage

Computers

University

Easy

Created by

Tia T

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is offensive security?

is the process of breaking into computer systems, exploiting software bugs, and finding loopholes in applications to gain unauthorized access to them.

is the process of protecting, storing, and reporting all data necessary to help prevent or prepare for a future attack that can happen.

is the process of fighting a attack on your own with no help and not letting anyone know what you're plans are or when the attacks are happening.

is the process of keeping and storing data that is found on the computer in files or flash drives to protect all data that could possibly be erased in event of a attacker.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is defensive security?

is the process of protecting an organization's network and computer systems by analyzing and securing any potential digital threats

is the process of breaking into a computer and checking to see if there is any deleted files or data that may need to be restored or analyzed.

is the process of working with a company and stealing their information

is the process of calling an organization and letting them know that they have a potential threat situation that can become worse if not handled immediately.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are the two main tasks of defensive security?

Preventing intrusions from occurring

preventing viruses from spreading to certain areas of the computer and reporting it without helping.

detecting intrusions when they occur and responding properly

noticing something suspicious but waiting until anything actually happens to say something.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are some of the tasks that are related to defensive security?

Documenting and managing assets

Updating and patching systems

Setting up logging and monitoring devices

User cyber awareness

Setting up preventative security devices

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Consequently, digital forensics will focus on different areas such as:

Network logs

System memory

File System

System logs

It support

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The four major phases of the incident response process are:

Detection and Analysis

Preparation

Containment, Eradication, and Recovery

Post-Incident Activity

Saving information for your own personal use

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware stands for:

malicious software

Malicious hardware

Suspicious emails

malicious files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?