Advanced Cyber Security Quiz

Advanced Cyber Security Quiz

University

15 Qs

quiz-placeholder

Similar activities

Computer Terminology

Computer Terminology

5th Grade - University

20 Qs

UAS Keamanan Sistem Informasi 2019 - A

UAS Keamanan Sistem Informasi 2019 - A

University

20 Qs

Terminologi Keamanan Jaringan

Terminologi Keamanan Jaringan

University

11 Qs

Computer Security Day Nov 30

Computer Security Day Nov 30

University

10 Qs

INFOASSURANCE

INFOASSURANCE

University

10 Qs

Digital Forensics

Digital Forensics

University

20 Qs

Cyber Security (OE)

Cyber Security (OE)

University

15 Qs

IAS CH4

IAS CH4

University

20 Qs

Advanced Cyber Security Quiz

Advanced Cyber Security Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Kwasi Boafo-Asante

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common technique used in static malware analysis?

Dynamic code execution

Disassembly

Network traffic analysis

Behavioural monitoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is primarily used to secure data transmitted over the internet?

HTTP

FTP

SSL/TLS

SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the digital evidence collection process?

Analysis of evidence

Preservation of evidence

Documentation of the scene

Collection of evidence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of an incident response strategy?

Ignoring minor incidents

Immediate data deletion

Incident containment

Public disclosure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of using a hash function in cryptography?

Encrypting data

Decrypting data

Ensuring data integrity

Generating random numbers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is commonly used for forensic data recovery from a damaged hard drive?

Wireshark

EnCase

Metasploit

Nessus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In malware analysis, what does the term "sandboxing" refer to?

Running malware in a controlled environment

Encrypting malware code

Deleting malware files

Disassembling malware code

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?