Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

University

48 Qs

quiz-placeholder

Similar activities

Bsit 2-1n

Bsit 2-1n

University

50 Qs

ИКТ 101-150

ИКТ 101-150

University

50 Qs

ISM401 - PRELIM EXAM

ISM401 - PRELIM EXAM

University

50 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

50 Qs

Educational Technology in the Asia Pacific Region

Educational Technology in the Asia Pacific Region

University

50 Qs

TechJar Round 1

TechJar Round 1

University

45 Qs

SOC Analyst Hard-Level MCQs

SOC Analyst Hard-Level MCQs

University

52 Qs

Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Dr. Kushwaha

Used 2+ times

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle ensures that original digital evidence remains unchanged during forensic analysis?

Chain of Custody

Data Hashing

Evidence Integrity

Forensic Soundness

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the cyber forensics process directly involves reconstructing user actions from logs and memory dumps?

Collection

Analysis

Documentation

Preservation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The admissibility of digital evidence in court primarily depends on:

Cryptographic algorithms used

Chain of Custody maintenance

Amount of evidence gathered

Storage media type

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAM dumps and open TCP connections are classified as:

Non-volatile evidence

Network evidence

Volatile evidence

Application evidence

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber threat type is characterized by long-term, highly targeted, and stealthy attacks?

Social Engineering

Insider Threats

Advanced Persistent Threats (APTs)

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The equation “Threat + Vulnerability + Impact = Risk” best represents:

CIA Triad

Risk Analysis Model

Vulnerability Lifecycle

Exploit Chain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability type is MOST associated with timing issues in concurrent processes?

Buffer Overflow

Race Condition

Privilege Escalation

Input Validation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?