
Cyber Analytics Quiz 1 & 2
Authored by Dr. Kushwaha
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
48 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle ensures that original digital evidence remains unchanged during forensic analysis?
Chain of Custody
Data Hashing
Evidence Integrity
Forensic Soundness
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which step of the cyber forensics process directly involves reconstructing user actions from logs and memory dumps?
Collection
Analysis
Documentation
Preservation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The admissibility of digital evidence in court primarily depends on:
Cryptographic algorithms used
Chain of Custody maintenance
Amount of evidence gathered
Storage media type
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
RAM dumps and open TCP connections are classified as:
Non-volatile evidence
Network evidence
Volatile evidence
Application evidence
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cyber threat type is characterized by long-term, highly targeted, and stealthy attacks?
Social Engineering
Insider Threats
Advanced Persistent Threats (APTs)
Malware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The equation “Threat + Vulnerability + Impact = Risk” best represents:
CIA Triad
Risk Analysis Model
Vulnerability Lifecycle
Exploit Chain
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which vulnerability type is MOST associated with timing issues in concurrent processes?
Buffer Overflow
Race Condition
Privilege Escalation
Input Validation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?