ESP Agreements and Forensics Quiz

ESP Agreements and Forensics Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

Unit 1 LO5 Ethical and Operational Issues and Threats

Unit 1 LO5 Ethical and Operational Issues and Threats

12th Grade

15 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade - University

15 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Digital Forensics Quiz

Digital Forensics Quiz

12th Grade

20 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

Cyber Camps 2018 -  Review Day 3 Windows

Cyber Camps 2018 - Review Day 3 Windows

7th - 12th Grade

17 Qs

IHT TEST PRACTICE

IHT TEST PRACTICE

9th - 12th Grade

13 Qs

Technical Terms - Internet (A-Z) - Proxy Server

Technical Terms - Internet (A-Z) - Proxy Server

12th Grade

10 Qs

ESP Agreements and Forensics Quiz

ESP Agreements and Forensics Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Alex McCluskey

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically included in an External Service Provider (ESP) agreement?

Cloud

Hardware

Physical security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What aspect is covered under the implications of ESP agreements regarding data movement across borders?

Encryption methods

Disaster recovery procedures

Geographical location and jurisdiction

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an element of security protection within ESP agreements?

Data security obligations

Liability for data breaches

Marketing strategies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does desktop forensics involve?

Conducting analysis on network devices

Collecting evidence from computer systems

Investigating malware activity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the challenges of live forensics?

Losing permanent files

Capturing data in active memory

Reviewing system logs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which methodology needs agreement for network forensics?

Scanning local infrastructure

Malware analysis

Network testing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be ensured before scanning local infrastructure during network forensics?

Disrupting a live system

Permission is granted

Reviewing firewall logs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?