CySA+ Days 7 & 8

CySA+ Days 7 & 8

University

36 Qs

quiz-placeholder

Similar activities

08. ACR-104 UNIT 22 EOU TEST

08. ACR-104 UNIT 22 EOU TEST

University

32 Qs

Certiport ITS Networking Troubleshooting

Certiport ITS Networking Troubleshooting

12th Grade - University

35 Qs

CPD222 Final 2/65

CPD222 Final 2/65

University

40 Qs

Goals

Goals

University

39 Qs

COD1101_Final Exam

COD1101_Final Exam

University

32 Qs

BSCS 4-1 - Elective 4 - Midterm Examination - 2023

BSCS 4-1 - Elective 4 - Midterm Examination - 2023

University

35 Qs

Excel avanzado

Excel avanzado

University

35 Qs

CySA+ Days 7 & 8

CySA+ Days 7 & 8

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Joshua Renihan

Used 8+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A record of a problem reported by a user or detected by a system is known as a (blank).

Requirement

Incident

Trouble Ticket

IT issue

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term refers to a security event that compromises the Confidentiality, Integrity, or Availability of an information system.

Trouble Ticket

Breach

Incident

Change Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a forensic image?

A forensic image is a type of digital camera used in investigations.
A forensic image is a physical photograph taken at a crime scene.
A forensic image is a complete, exact copy of a digital storage device used for forensic analysis.
A forensic image is a software program for data recovery.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must you do prior to collecting forensic evidence during an incident response?

Establish a Chain of Custody

Obtain Authorization or Consent

Create a bit-by-bit copy of the storage device

Obtain a tamper-evident bag & seal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a forensic investigator perform periodically to safeguard the collected data against any accidental or intentional alterations during the investigation process?

Seal it in a tamper-evident bag

Store it in a secure location

Maintain a proper Chain of Custody

Conduct a Data Integrity Check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique can be used to provide a way to verify the authenticity and integrity of data during forensic investigations?

Use tamper tape

Store it in a secure location

Digitally sign a copy of it

Sprinkle salt on some hash browns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way a forensic investigator can validate the integrity of a physical device during an incident response?

Use tamper-evident seals

Store it in a secure foot locker

Keep it in a personal safe

Keep it under 24/7 surveillance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?