C S+ U11

C S+ U11

11th Grade

20 Qs

quiz-placeholder

Similar activities

Unit 4 Vocabulary - AP CSP

Unit 4 Vocabulary - AP CSP

9th - 12th Grade

20 Qs

APCSP CSN-1.E Network Redundancy and Fault Tolerance

APCSP CSN-1.E Network Redundancy and Fault Tolerance

9th - 12th Grade

20 Qs

Unit 6 Vocab Part 1

Unit 6 Vocab Part 1

10th - 12th Grade

15 Qs

AP CSP: The Internet

AP CSP: The Internet

10th - 12th Grade

16 Qs

AP CSP Internet

AP CSP Internet

9th - 12th Grade

21 Qs

Linux - Unit 5 Review

Linux - Unit 5 Review

9th - 12th Grade

20 Qs

Cybersecurity Essentials Chapter 6 Review

Cybersecurity Essentials Chapter 6 Review

9th Grade - University

20 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

C S+ U11

C S+ U11

Assessment

Quiz

Computers

11th Grade

Hard

Created by

LTC Jimmy Thomas

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following solutions typically consists of physical storage devices or networked data centers that are created and maintained locally?

Storage Area Network (SAN)

Network-Attached Storage (NAS)

Onsite backup

Offsite backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In command line, what command would be used to run a network exploration and security/port scan?

grep

ping

dig

nmap

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the best tool to use to utilize cryptographic tools?

OpenSSL

SSH

PowerShell

Python

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensics tool is used to copy everything from a file and then copy it to a separate storage device?

FTK imager

WinHex

Autopsy

Memdump

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command combines the results of ping and traceroute?

nslookup

arp

curl

pathping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a step to the acquisition of evidence?

Who has the evidence now?

Who collected the evidence?

Why was the evidence collected?

How was the evidence stored?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmad is conducting a digital investigation where he is looking through emails, business communications, and other data used by a company. What is this called?

E-Discovery

Preservation

Provenance

Nonrepudiation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?