Search Header Logo

Module 13 (Fundamentals of Cybersecurity)

Authored by Kelly Gafford

Computers

University

Used 4+ times

Module 13 (Fundamentals of Cybersecurity)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

  1. The principle of (a)   means giving users only the permissions they absolutely need to perform their jobs.

2.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

  1. (a)   is a widely used open-source knowledge base that details the various stages of a cyber attack.

3.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

  1. The process of collecting, preserving, and analyzing digital evidence is called (a)   .

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Discretionary Access Control (DAC) is a stricter, label-based system where access is determined by sensitivity levels. (True/False)

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A runbook provides higher-level guidance outlining the overall response to different incident types. (True/False)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Maintaining a documented chain of custody is not important for ensuring the admissibility of evidence in court. (True/False)

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following is NOT a common motivation for cybersecurity attacks?

  1. Financial gain

  1. Espionage

  1. Philanthropy

  1. Disruption and chaos

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?