CO2517

CO2517

University

•

25 Qs

quiz-placeholder

Similar activities

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

•

20 Qs

ISPM2  Quiz 1

ISPM2 Quiz 1

University

•

20 Qs

COMP_Technical Quiz_Round 2

COMP_Technical Quiz_Round 2

12th Grade - University

•

20 Qs

Industrial Electronics Prelim Quiz 1

Industrial Electronics Prelim Quiz 1

University

•

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

•

20 Qs

PHP First Internal Practical Viva

PHP First Internal Practical Viva

University

•

20 Qs

Design Thinking Overview

Design Thinking Overview

University

•

20 Qs

CO2517

CO2517

Assessment

Quiz

•

Computers

•

University

•

Practice Problem

•

Medium

Created by

Christopher Finnigan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of these is NOT part of the ACPO guidelines

 That no action take is taken that should change data held on a digital device including a computer or mobile phone that may subsequently be relied upon as evidence in court

Where a person finds it necessary to access original data held on a digital device that the person must be competent to do so and able to explain their actions and the implications of those actions on the digital evidence to a Court.

That a trail or record of all actions taken that have been applied to the digital evidence should be created and preserved. An independent third party forensic expert should be able to examine those processes and reach the same conclusion.

That the individual in charge of the investigation has overall responsibility to ensure that these principles are followed.

The evidence must prove that there is a conviction of guilty

Answer explanation

There is no seeking to convict or nor bias throughout the investigation, you are seeking to discover evidence of an event and its associated data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is an Event?

Anything that happens on our network

Something that damages our network

Anything that triggers a response from our servers

Answer explanation

Events happen all the time on networks and in life.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a Security Incident?

Anything we believe might be on our network

Only items that are logged as harmful

Any event we know or suspect adverse to our network

Only something defined in our Response Plan

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

A disruption of service on your network could be considered a

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

an authenticated student accessing their files via ssh, is a

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

A student logging into our system correctly could be considered either an incident or an event, which is it?

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Malware could be considered either an incident or an event , which is it?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?