CySA Review 7 & 8

CySA Review 7 & 8

Professional Development

21 Qs

quiz-placeholder

Similar activities

CySA+ Acronyms

CySA+ Acronyms

Professional Development

18 Qs

Forensic

Forensic

Professional Development

19 Qs

CHFI QUIZ

CHFI QUIZ

Professional Development

20 Qs

Business Processes - Lesson 1 - BSL + CSI + SOP

Business Processes - Lesson 1 - BSL + CSI + SOP

Professional Development

22 Qs

Sec+ Day1 Security Concepts & Threat Types

Sec+ Day1 Security Concepts & Threat Types

Professional Development

22 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

Synopsys IQ Masters 2020 - Round 02

Synopsys IQ Masters 2020 - Round 02

Professional Development

16 Qs

Foundation Chapter 5

Foundation Chapter 5

Professional Development

24 Qs

CySA Review 7 & 8

CySA Review 7 & 8

Assessment

Quiz

Computers

Professional Development

Easy

Created by

J Liles

Used 3+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

George gathered forensics from a recent intrusion in preparation for legal proceedings. He used EnCase to gather the digital forensics, cloned the hard drive, and took the hard drive home for further analysis. Which of the following did he violate?

Clone procedures

Chain of Command

Chain of Custody

Hashing procedures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

George identified 3 Mycc computers that are infected with malware and Windows Defender was unable to detect it. Where is the BEST place to acquire evidence to perform data carving?

Registry

Hard Drive

Memory

Control panel

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would you use to verify that a disk image you created has not been altered

Nessus

Hash

TPM

MD2020

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which four phases outline the procedures involved in a forensics investigation? (select four)

Identification

Collection

Verifying

Analysis

Reporting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To preserve evidence of a temporary file system mounted to a host, which system device must you target for evidence collection?

RAM

HDD

SSD

USB

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During an incident response, George obtained evidence from the hard drive of a hacked server. What should he do to ensure the data integrity of the evidence?

Complete Chain of Custody doc

Create hashes for each file on the drive

Encrypt it with AES

Don’t worry about it

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first thing that needs to be done when starting an investigation into a cyber security event?

Cry

Secure crime scene

Interview witnesses

Call the police

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?