Information Security UK 15

Information Security UK 15

University

10 Qs

quiz-placeholder

Similar activities

Computer Science: Computer Systems

Computer Science: Computer Systems

6th Grade - University

10 Qs

Introduction to AI - Healthcare & Business

Introduction to AI - Healthcare & Business

University - Professional Development

10 Qs

Quiz Rolling Vol.8

Quiz Rolling Vol.8

10th Grade - University

10 Qs

Arduino - Contador

Arduino - Contador

9th Grade - University

11 Qs

Internet_Intranet_Extranet

Internet_Intranet_Extranet

University

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

6-文件操作

6-文件操作

University

10 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Information Security UK 15

Information Security UK 15

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ultimate goal of any ....................................................... plan is to contain, recover, and resume normal operations as quickly and smoothly as possible.

Incident Detection

incident response (IR)

Incident Recovery

Incident Coverate

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The field of.............................................. is dedicated to the identifying, extracting, preserving, and reporting on data obtained from a computer system.

computer security

computer cryptology

computer forensics

computer protection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ............................................................ in digital forensics can also be referred to as the forensic link, the paper trail, or the chronological documentation of digital evidence.

chain of forensics

chain of custody

chain of link

chain of document

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network-based data comes from communications captured from a network-based system, such as a ................................................

firewall or IDS.

RAM

Monitor

Hard disk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensic backup, usually called a ..................................................... is an exact duplicate of contents of the entire drive—including the free or “unused” space

bit-stream backup,

VM copy

Cut copy

Hard disc backup

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...................................... are automated packages that create back doors, remove incriminating log entries, and alter system binaries to hide the intruder’s presence

trojans

Rootkits

virus

worms

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the latency of 5G is ..........

1ms

1sec

1minute

1 hour

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?