CySA Review 7 & 8

CySA Review 7 & 8

Professional Development

21 Qs

quiz-placeholder

Similar activities

Direccionamiento IP básico

Direccionamiento IP básico

Professional Development

18 Qs

LPC 16 - AIO

LPC 16 - AIO

Professional Development

20 Qs

U.T. 7: Configuración de Routers y Encaminamiento

U.T. 7: Configuración de Routers y Encaminamiento

Professional Development

20 Qs

MS OFFICE QUIZ 01

MS OFFICE QUIZ 01

Professional Development

20 Qs

Coleções - Python

Coleções - Python

University - Professional Development

17 Qs

NM-BIG DATA Course

NM-BIG DATA Course

Professional Development

20 Qs

Sistemas Operativos 1

Sistemas Operativos 1

Professional Development

20 Qs

latihan-hari-02-digiup-jna

latihan-hari-02-digiup-jna

Professional Development

20 Qs

CySA Review 7 & 8

CySA Review 7 & 8

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

J Liles

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

George gathered forensics from a recent intrusion in preparation for legal proceedings. He used EnCase to gather the digital forensics, cloned the hard drive, and took the hard drive home for further analysis. Which of the following did he violate?

Clone procedures

Chain of Command

Chain of Custody

Hashing procedures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

George identified 3 Mycc computers that are infected with malware and Windows Defender was unable to detect it. Where is the BEST place to acquire evidence to perform data carving?

Registry

Hard Drive

Memory

Control panel

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would you use to verify that a disk image you created has not been altered

Nessus

Hash

TPM

MD2020

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which four phases outline the procedures involved in a forensics investigation? (select four)

Identification

Collection

Verifying

Analysis

Reporting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To preserve evidence of a temporary file system mounted to a host, which system device must you target for evidence collection?

RAM

HDD

SSD

USB

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During an incident response, George obtained evidence from the hard drive of a hacked server. What should he do to ensure the data integrity of the evidence?

Complete Chain of Custody doc

Create hashes for each file on the drive

Encrypt it with AES

Don’t worry about it

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first thing that needs to be done when starting an investigation into a cyber security event?

Cry

Secure crime scene

Interview witnesses

Call the police

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?