
Cybersecurity study
Authored by Tia T
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is offensive security?
is the process of breaking into computer systems, exploiting software bugs, and finding loopholes in applications to gain unauthorized access to them.
is the process of protecting, storing, and reporting all data necessary to help prevent or prepare for a future attack that can happen.
is the process of fighting a attack on your own with no help and not letting anyone know what you're plans are or when the attacks are happening.
is the process of keeping and storing data that is found on the computer in files or flash drives to protect all data that could possibly be erased in event of a attacker.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is defensive security?
is the process of protecting an organization's network and computer systems by analyzing and securing any potential digital threats
is the process of breaking into a computer and checking to see if there is any deleted files or data that may need to be restored or analyzed.
is the process of working with a company and stealing their information
is the process of calling an organization and letting them know that they have a potential threat situation that can become worse if not handled immediately.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
what are the two main tasks of defensive security?
Preventing intrusions from occurring
preventing viruses from spreading to certain areas of the computer and reporting it without helping.
detecting intrusions when they occur and responding properly
noticing something suspicious but waiting until anything actually happens to say something.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
what are some of the tasks that are related to defensive security?
Documenting and managing assets
Updating and patching systems
Setting up logging and monitoring devices
User cyber awareness
Setting up preventative security devices
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Consequently, digital forensics will focus on different areas such as:
Network logs
System memory
File System
System logs
It support
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
The four major phases of the incident response process are:
Detection and Analysis
Preparation
Containment, Eradication, and Recovery
Post-Incident Activity
Saving information for your own personal use
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware stands for:
malicious software
Malicious hardware
Suspicious emails
malicious files
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
21 questions
Differensial test 1.0
Quiz
•
University
23 questions
Fundamentos de HTML y CSS
Quiz
•
11th Grade - University
23 questions
Post Produzione-Foto
Quiz
•
University - Professi...
23 questions
Section 9: Networking (30-36)
Quiz
•
University
26 questions
Macromedia Flash
Quiz
•
8th Grade - Professio...
24 questions
Chủ đề: Ms Word 2
Quiz
•
2nd Grade - Professio...
21 questions
ISA111 - QUIZ #1
Quiz
•
University
21 questions
Literasi Teknologi Informasi & Python Basic
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade