Computer Cyber 2 S3C2

Computer Cyber 2 S3C2

11th Grade

30 Qs

quiz-placeholder

Similar activities

IT Fundamentals:  6.0 Security

IT Fundamentals: 6.0 Security

11th - 12th Grade

29 Qs

OCR Computer Science 1.4.1

OCR Computer Science 1.4.1

9th - 11th Grade

30 Qs

TLJ - KD 3.9 - 4.9 Konsep kerja softswitch berkaitan dengan

TLJ - KD 3.9 - 4.9 Konsep kerja softswitch berkaitan dengan

11th Grade

25 Qs

2.2.1 Cyber More on Malware

2.2.1 Cyber More on Malware

9th - 12th Grade

27 Qs

T-Level DPDD: Selection Programming Concepts Quiz

T-Level DPDD: Selection Programming Concepts Quiz

11th Grade

31 Qs

Year 9 End of Term Quiz

Year 9 End of Term Quiz

8th Grade - University

28 Qs

CIW IBA Assessment

CIW IBA Assessment

9th - 12th Grade

30 Qs

Y9 Assessment 3 Revision Quiz

Y9 Assessment 3 Revision Quiz

10th - 11th Grade

29 Qs

Computer Cyber 2 S3C2

Computer Cyber 2 S3C2

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Patrick Carter

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fundamentally, deleting a file is giving a direct command to which code, algorithm, or computer function?

SIEM

FAT

EXIF

META

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sam says his team is about to capture a system image as part of a forensic investigation. What is Sam about to do?

burn a CD-ROM copy of some removable media

pull the event log files from a compromised system

back up the system data for a computer

copy an entire drive's data onto another drive

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What government agency MOST directly maintains the National Cryptologic Museum?

Department of Defense

Department of Homeland Security

National Security Agency

Federal Bureau of Investigation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Every system on a network must have a DNS client running if it needs to connect to the internet to resolve host names.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one major advantage virtualization offers when running a server?

automatically running common processes

migrating in case of hardware failure

a more secure operating environment

built-in email scanning capabilities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which stage of a secure email chain does virus scanning typically occur?

when it first arrives in the security appliance

between the security appliance and the server

between the server and the client

at the client system itself

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Trusted Platform Module motherboard chip?

validating firmware device signatures

storing keys separate from hard drives

translating encryption to FAT32 file systems

encrypting specific Windows-critical files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?