Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

University

48 Qs

quiz-placeholder

Similar activities

UTS Pemodelan Proses Bisnis

UTS Pemodelan Proses Bisnis

University

50 Qs

ICT 3rd Term Test Paper

ICT 3rd Term Test Paper

6th Grade - University

50 Qs

Кәсіби ағылшын 51 - 100

Кәсіби ағылшын 51 - 100

University

50 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

50 Qs

TechJar Round 1

TechJar Round 1

University

45 Qs

BSIT3201_ME

BSIT3201_ME

University

50 Qs

CompTIA A+ Revision

CompTIA A+ Revision

University

48 Qs

ICT C3 Year 7 Quiz 2024

ICT C3 Year 7 Quiz 2024

7th Grade - University

45 Qs

Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Dr. Kushwaha

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle ensures that original digital evidence remains unchanged during forensic analysis?

Chain of Custody

Data Hashing

Evidence Integrity

Forensic Soundness

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the cyber forensics process directly involves reconstructing user actions from logs and memory dumps?

Collection

Analysis

Documentation

Preservation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The admissibility of digital evidence in court primarily depends on:

Cryptographic algorithms used

Chain of Custody maintenance

Amount of evidence gathered

Storage media type

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAM dumps and open TCP connections are classified as:

Non-volatile evidence

Network evidence

Volatile evidence

Application evidence

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber threat type is characterized by long-term, highly targeted, and stealthy attacks?

Social Engineering

Insider Threats

Advanced Persistent Threats (APTs)

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The equation “Threat + Vulnerability + Impact = Risk” best represents:

CIA Triad

Risk Analysis Model

Vulnerability Lifecycle

Exploit Chain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability type is MOST associated with timing issues in concurrent processes?

Buffer Overflow

Race Condition

Privilege Escalation

Input Validation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?