Module 13 (Fundamentals of Cybersecurity)

Module 13 (Fundamentals of Cybersecurity)

University

12 Qs

quiz-placeholder

Similar activities

Recap - Cloud Computing

Recap - Cloud Computing

University

10 Qs

|| Serverless Workshop ||

|| Serverless Workshop ||

University

15 Qs

Digital Forensics Examinations Lab

Digital Forensics Examinations Lab

University

8 Qs

Computer Forensics

Computer Forensics

University

8 Qs

Digital Wellbeing

Digital Wellbeing

University

14 Qs

Introduction to MS Access 2013

Introduction to MS Access 2013

7th Grade - University

10 Qs

Tech-Law Quiz

Tech-Law Quiz

University

10 Qs

JRDL - JS Arrays and Objects

JRDL - JS Arrays and Objects

6th Grade - Professional Development

12 Qs

Module 13 (Fundamentals of Cybersecurity)

Module 13 (Fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. The principle of ______________ means giving users only the permissions they absolutely need to perform their jobs.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. ______________ is a widely used open-source knowledge base that details the various stages of a cyber attack.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. The process of collecting, preserving, and analyzing digital evidence is called _____________.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Discretionary Access Control (DAC) is a stricter, label-based system where access is determined by sensitivity levels. (True/False)

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A runbook provides higher-level guidance outlining the overall response to different incident types. (True/False)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Maintaining a documented chain of custody is not important for ensuring the admissibility of evidence in court. (True/False)

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following is NOT a common motivation for cybersecurity attacks?

  1. Financial gain

  1. Espionage

  1. Philanthropy

  1. Disruption and chaos

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?