Midterm Review 2

Midterm Review 2

11th Grade

14 Qs

quiz-placeholder

Similar activities

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

HLL and LLL

HLL and LLL

11th Grade

10 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

PAS GANJIL 2024

PAS GANJIL 2024

11th Grade

10 Qs

Arrays, 2D Arrays, and ArrayLists

Arrays, 2D Arrays, and ArrayLists

9th - 12th Grade

15 Qs

ICT Computer Basics pt1

ICT Computer Basics pt1

10th - 12th Grade

12 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

Midterm Review 2

Midterm Review 2

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Angelina CTA]

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true regarding precautions you should take when looking for forensic tools on the Internet?

If the tool is accurate, there should be no problems using it.

You must be certified in this tool in case you have to go to court.

The tool must be endorsed by the FBI.

You need to be verify that the tool is not considered junk science.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been called to analyze a company computer that has potentially stolen information. What is your first step?

Obtain a search warrant

Install a write-blocker to the system

Shut the system off to prevent remote access

Install Encase on the machine to begin the forensic search

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The FBI has a permanent team of computer forensics. They call their team the ____ team.

CIRT

CART

RCFL

First-response

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addition to having a solid foundation in computer forensics, a technician should have some expertise and understanding of ____.

business management

engineering

criminal justice

analytics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After an incident is isolated or contained, what does the SANS institute suggest as the next phase?

Eradication

Recovery

Identification

Lessons learned

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does incident response differ from risk management?

Risk management provides the steps for an incident response.

Risk management is performed by first responders, and incident response is performed by the CSIRT.

Risk management is optional; incident response is mandatory.

Risk management helps analyze and set prevention strategies, and incident response consists of the steps to follow if an incident still occurs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user responded to a phishing e-mail and provided some company data as a result. After the incident is contained, which of the following would be done in the lessons learned stage of the IRP?

Install encrypted an e-mail system

Review the annual training procedures on phishing

Have the employee who opened the e-mail explain why they answered the e-mail

Update the risk assessment procedures for e-mail usage

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?