C S+ U11

C S+ U11

11th Grade

20 Qs

quiz-placeholder

Similar activities

Types of Networks - LANs and WANs

Types of Networks - LANs and WANs

10th - 11th Grade

23 Qs

Network Bandwidth

Network Bandwidth

10th - 11th Grade

20 Qs

Teknologi Layanan Jaringan

Teknologi Layanan Jaringan

9th - 12th Grade

15 Qs

Unit 1 Review Test Mod 1.1-1.5 #2

Unit 1 Review Test Mod 1.1-1.5 #2

9th - 12th Grade

18 Qs

Computer Network

Computer Network

11th - 12th Grade

16 Qs

R050 April Topic Summary

R050 April Topic Summary

11th Grade

16 Qs

The Internet

The Internet

6th Grade - University

16 Qs

Linux - Unit 5 Review

Linux - Unit 5 Review

9th - 12th Grade

20 Qs

C S+ U11

C S+ U11

Assessment

Quiz

Computers

11th Grade

Hard

Created by

LTC Jimmy Thomas

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following solutions typically consists of physical storage devices or networked data centers that are created and maintained locally?

Storage Area Network (SAN)

Network-Attached Storage (NAS)

Onsite backup

Offsite backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In command line, what command would be used to run a network exploration and security/port scan?

grep

ping

dig

nmap

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the best tool to use to utilize cryptographic tools?

OpenSSL

SSH

PowerShell

Python

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensics tool is used to copy everything from a file and then copy it to a separate storage device?

FTK imager

WinHex

Autopsy

Memdump

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command combines the results of ping and traceroute?

nslookup

arp

curl

pathping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a step to the acquisition of evidence?

Who has the evidence now?

Who collected the evidence?

Why was the evidence collected?

How was the evidence stored?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmad is conducting a digital investigation where he is looking through emails, business communications, and other data used by a company. What is this called?

E-Discovery

Preservation

Provenance

Nonrepudiation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?