After Samuel forensically imaged a hard drive from a company's server as part of an investigation into a suspected data breach, which of the following actions should he perform FIRST to ensure the evidence is properly handled?

Penn Test

Quiz
•
Computers
•
12th Grade
•
Hard
Hazem Saleh
Used 1+ times
FREE Resource
70 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Encrypt the source drive to ensure an attacker cannot modify its contents
Create a hash digest of the source drive and the image file to ensure they match
Digitally sign the image file to provide non-repudiation of the collection
Encrypt the image file to ensure it maintains data integrity
Answer explanation
Creating a hash digest of the source drive and the image file is the first step to ensure data integrity and verify they match, maintaining the evidence's integrity.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Imagine Luna is monitoring a web application for a school project and notices some unusual data patterns. Which of the following tools could Luna use to detect this unexpected output from the application being managed or monitored?
Manual analysis
A behavior-based analysis tool
A signature-based detection tool
A log analysis tool
Answer explanation
Luna should use a behavior-based analysis tool to detect unexpected output as it focuses on identifying abnormal patterns in the data.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Imagine your company, led by Lily and Grace, processes payment information and must adhere to PCI-DSS standards. Anika, the security lead, discovers a data breach. What type of disclosure is required during the incident response?
Notification to federal law enforcement
Notification to your credit card processor
Notification to local law enforcement
Notification to Visa and Mastercard
Answer explanation
During a data breach incident response, notification to your credit card processor is required to adhere to PCI-DSS standards.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a forensic investigation of a high-profile data breach at a multinational corporation, what information should be recorded on a chain of custody form?
Any individual who worked with evidence during the investigation, including IT specialists like Ava and forensic analysts like Avery
The law enforcement agent, such as Detective Sophia, who was first on the scene
The list of individuals who made contact with files leading to the investigation, including employees and external consultants
The list of former owners/operators of the workstation involved in the investigation, including previous employees and contractors
Answer explanation
The chain of custody form should record any individual who worked with evidence during the investigation, including IT specialists like Ava and forensic analysts like Avery.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Barbara received a phone call from a colleague asking why she sent him an email with lewd and unusual content. Barbara doesn't remember sending the email to the colleague. What is Barbara MOST likely the victim of?
Ransomware
Spear phishing
Hijacked email
Phishing
Answer explanation
Barbara is most likely the victim of a hijacked email because she doesn't remember sending the lewd email, indicating someone else gained unauthorized access to her email account.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Michael is tasked with enhancing the security measures of his company's website and decides to analyze its DNS records to better understand its network setup. In his analysis, he opts to use nslookup in interactive mode. Which command should he use to specifically request records for the name servers?
request type=ns
locate type=ns
transfer type=ns
set type=ns
Answer explanation
Olivia should use the 'set type=ns' command in nslookup interactive mode to specifically request records for the name servers.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a high-security clearance process at a research facility, Michael is asked to authenticate his identity through a system that matches patterns on the eye's surface using near-infrared imaging. Which biometric authentication factor is being used?
Facial recognition
Iris scan
Pupil dilation
Retinal scan
Answer explanation
The correct biometric authentication factor being used in the scenario described is an Iris scan, which matches patterns on the eye's surface using near-infrared imaging.
Create a free account and access millions of resources
Similar Resources on Quizizz
65 questions
Salesforce Mobile App Rollout Strategy

Quiz
•
12th Grade
75 questions
Review Computer Question

Quiz
•
9th - 12th Grade
72 questions
Communications and Networks EOU Test

Quiz
•
12th Grade
70 questions
Computing A level AQA

Quiz
•
12th Grade - University
72 questions
ENSA - Modules 9-12

Quiz
•
12th Grade
67 questions
CSP Unit 1-6 Quiz Review

Quiz
•
9th - 12th Grade
75 questions
APCS Principles Practice Exam

Quiz
•
8th Grade - University
75 questions
Y11 Architecture & Primary Homework

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University