Module 13 (Fundamentals of Cybersecurity)

Module 13 (Fundamentals of Cybersecurity)

University

12 Qs

quiz-placeholder

Similar activities

MODULE 1: Introduction to the concepts of ICT

MODULE 1: Introduction to the concepts of ICT

University

15 Qs

Introduction to database systems

Introduction to database systems

University

10 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

E32WEEK 03

E32WEEK 03

University

10 Qs

[Quiz] C1 - Security Concepts & Models

[Quiz] C1 - Security Concepts & Models

University

10 Qs

Chapter 7+8

Chapter 7+8

University

7 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

Quiz - Chapter 1 and Chapter 2

Quiz - Chapter 1 and Chapter 2

University

15 Qs

Module 13 (Fundamentals of Cybersecurity)

Module 13 (Fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. The principle of ______________ means giving users only the permissions they absolutely need to perform their jobs.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. ______________ is a widely used open-source knowledge base that details the various stages of a cyber attack.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. The process of collecting, preserving, and analyzing digital evidence is called _____________.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Discretionary Access Control (DAC) is a stricter, label-based system where access is determined by sensitivity levels. (True/False)

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A runbook provides higher-level guidance outlining the overall response to different incident types. (True/False)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Maintaining a documented chain of custody is not important for ensuring the admissibility of evidence in court. (True/False)

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following is NOT a common motivation for cybersecurity attacks?

  1. Financial gain

  1. Espionage

  1. Philanthropy

  1. Disruption and chaos

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers