UTB - FCNS 221PB

UTB - FCNS 221PB

University

10 Qs

quiz-placeholder

Similar activities

WLAN

WLAN

University

10 Qs

Module 4-Inter vlan routing

Module 4-Inter vlan routing

9th Grade - University

8 Qs

INASEC1-SecurityTechnology 2324B

INASEC1-SecurityTechnology 2324B

University

15 Qs

Quiz 2

Quiz 2

University

15 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Computer Networks Quiz

Computer Networks Quiz

University

14 Qs

CSC134_Chapter 8

CSC134_Chapter 8

University

15 Qs

Y6 L2 Understanding Digital Networks

Y6 L2 Understanding Digital Networks

6th Grade - University

10 Qs

UTB - FCNS 221PB

UTB - FCNS 221PB

Assessment

Quiz

Computers

University

Hard

Created by

MAD Project

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a common type of network forensic data?

Network traffic logs

Web browser history

Email messages

User account activity logs

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step in conducting a network forensic investigation?

Developing a hypothesis

Analyzing the network traffic

Identifying the scope of the investigation

Preserving the network evidence

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a network traffic capture tool?

To prevent unauthorized access to the network

To decrypt encrypted network traffic

To identify and block malicious traffic

To capture and analyze network traffic packets

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a common risk mitigation strategy?

Avoiding the risk

Transferring the risk

Increasing the severity of the risk

Reducing the likelihood of the risk

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of risk avoidance?

A company decides not to invest in a new product because it is too risky.

A company purchases insurance to protect itself from financial losses due to lawsuits.

A company implements a new security system to prevent data breaches.

A company increases the price of its products to cover the cost of potential risks.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a component of the CIA Triad in cybersecurity?

Confidentiality

Integrity

Availability

Authentication

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a best practice for creating a strong password?

Using a combination of upper and lowercase letters, numbers, and symbols

Reusing the same password for multiple accounts

Choosing a short, easy-to-remember password

Jawaban

Using personal information like birthdates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?