
Module 13 (Fundamentals of Cybersecurity)
Authored by Kelly Gafford
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
The principle of (a) means giving users only the permissions they absolutely need to perform their jobs.
2.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
(a) is a widely used open-source knowledge base that details the various stages of a cyber attack.
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
The process of collecting, preserving, and analyzing digital evidence is called (a) .
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Discretionary Access Control (DAC) is a stricter, label-based system where access is determined by sensitivity levels. (True/False)
Discretionary Access Control (DAC) is a stricter, label-based system where access is determined by sensitivity levels. (True/False)
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A runbook provides higher-level guidance outlining the overall response to different incident types. (True/False)
A runbook provides higher-level guidance outlining the overall response to different incident types. (True/False)
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maintaining a documented chain of custody is not important for ensuring the admissibility of evidence in court. (True/False)
Maintaining a documented chain of custody is not important for ensuring the admissibility of evidence in court. (True/False)
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a common motivation for cybersecurity attacks?
Which of the following is NOT a common motivation for cybersecurity attacks?
Financial gain
Espionage
Philanthropy
Disruption and chaos
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?