quiz 1

quiz 1

University

5 Qs

quiz-placeholder

Similar activities

Network Forensics SQ 1

Network Forensics SQ 1

University

10 Qs

SGT RED TEAM KAMPI HACKER GÖZÜNDEN MODERN WEB NASIL ÇALIŞIR

SGT RED TEAM KAMPI HACKER GÖZÜNDEN MODERN WEB NASIL ÇALIŞIR

University

10 Qs

DFIR

DFIR

University

10 Qs

React and Hooks Quiz

React and Hooks Quiz

University

10 Qs

IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

University

10 Qs

DFC20283 CHAPTER 5 (5.1.6-5.1.9)

DFC20283 CHAPTER 5 (5.1.6-5.1.9)

University

10 Qs

Chapter 8: Developing Business IT Solutions

Chapter 8: Developing Business IT Solutions

University

10 Qs

SPM Pre-test

SPM Pre-test

University

10 Qs

quiz 1

quiz 1

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Christopher Clardy

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Flora recently received a mail from a bank that contained a malicious link along with some instructions. The malicious link redirected her to a form requesting details such as her name, phone number, date of birth, credit card number, CVV code, SNNs, and email address.

Identify the type of cybercrime being performed on Flora in the above scenario.

Phishing

Espionage

Brute-force attack

Privilege escalation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane, a disgruntled employee of an organization, was waiting for an opportunity to target the organization. One day, he gained access to the project manager’s system and copied all the secret codes to his portable device. After copying, Kane handed over the code to a rival company, which released the software to the public with their proprietary patents.

Identify the type of attack Kane has launched in the above scenario

Trojan horse attack

Privilege escalation attack

Intellectual property theft

Data manipulation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following acts contains Article 32, which deals with technical and organizational measures to encrypt personal data and ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services?

PCI–DSS

GDPR

HIPAA

GLBA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following phases of a forensic investigation involves acquiring, preserving, and analyzing evidence found in the crime scene to identify the culprit?

Planning and budgeting phase

Investigation phase

Post-investigation phase

Pre-investigation phase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the member of an investigation team who provides legal advice on conducting the investigation and addresses the legal issues involved in the forensic investigation process.

Incident analyzer

Evidence manager

Attorney

Photographer

Discover more resources for Information Technology (IT)