Ias 2 3A

Ias 2 3A

University

12 Qs

quiz-placeholder

Similar activities

KCTF Quiz -1

KCTF Quiz -1

University

10 Qs

itAppB MT Q1

itAppB MT Q1

University

10 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

ias 3b

ias 3b

University

14 Qs

Cyber Security MSc Quiz

Cyber Security MSc Quiz

University

10 Qs

Understanding Cyber Security Incidents

Understanding Cyber Security Incidents

University

15 Qs

Css

Css

University

10 Qs

Digital Forensics Quiz A

Digital Forensics Quiz A

University

10 Qs

Ias 2 3A

Ias 2 3A

Assessment

Quiz

Computers

University

Medium

Created by

Jamaica Basilio

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

Refers to the systematic approach to addressing and managing aftermath of a security breach or cyber incident.

2.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

___________ entails establishing an incident response policy.

3.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

This phase focuses on recognizing and validating security incidents.

4.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

It refers to the practice of using digital tools and techniques to secretly gather confidential or sensitive information without authorization.

5.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

also known as digital or cyber forencics.

6.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

Refers to a network of interconnected devices that collect, exchange and process data in real time.

7.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

Computer forensics began in the

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?