UTB - FCNS 221PB

UTB - FCNS 221PB

University

10 Qs

quiz-placeholder

Similar activities

Unit 3 - 2.4.8 DoS & DDoS

Unit 3 - 2.4.8 DoS & DDoS

9th Grade - University

10 Qs

Basic Networking

Basic Networking

University

10 Qs

Building a Small Network

Building a Small Network

University

10 Qs

Software engineering

Software engineering

University

10 Qs

WJEC ICT  - Chapter 2 - Network Protocols

WJEC ICT - Chapter 2 - Network Protocols

10th Grade - University

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

S2C SECURITY MEASURES

S2C SECURITY MEASURES

University

9 Qs

Module 8-Network Layer

Module 8-Network Layer

9th Grade - University

12 Qs

UTB - FCNS 221PB

UTB - FCNS 221PB

Assessment

Quiz

Computers

University

Hard

Created by

MAD Project

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a common type of network forensic data?

Network traffic logs

Web browser history

Email messages

User account activity logs

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step in conducting a network forensic investigation?

Developing a hypothesis

Analyzing the network traffic

Identifying the scope of the investigation

Preserving the network evidence

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a network traffic capture tool?

To prevent unauthorized access to the network

To decrypt encrypted network traffic

To identify and block malicious traffic

To capture and analyze network traffic packets

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a common risk mitigation strategy?

Avoiding the risk

Transferring the risk

Increasing the severity of the risk

Reducing the likelihood of the risk

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of risk avoidance?

A company decides not to invest in a new product because it is too risky.

A company purchases insurance to protect itself from financial losses due to lawsuits.

A company implements a new security system to prevent data breaches.

A company increases the price of its products to cover the cost of potential risks.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a component of the CIA Triad in cybersecurity?

Confidentiality

Integrity

Availability

Authentication

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a best practice for creating a strong password?

Using a combination of upper and lowercase letters, numbers, and symbols

Reusing the same password for multiple accounts

Choosing a short, easy-to-remember password

Jawaban

Using personal information like birthdates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?