quiz 1

quiz 1

University

5 Qs

quiz-placeholder

Similar activities

Module 2

Module 2

University

10 Qs

REVIEW TIME

REVIEW TIME

9th Grade - University

10 Qs

General ExpressJS Quiz

General ExpressJS Quiz

University

10 Qs

SQL PRE-ASSESSMENT (MOTIVATION)

SQL PRE-ASSESSMENT (MOTIVATION)

University

10 Qs

Power of AI Tools

Power of AI Tools

University

10 Qs

QUIZ-1 KELAS XI

QUIZ-1 KELAS XI

University

10 Qs

8th Social Media and Modern Communication Assessment

8th Social Media and Modern Communication Assessment

8th Grade - University

10 Qs

PT101: Quiz No. 1

PT101: Quiz No. 1

University

10 Qs

quiz 1

quiz 1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Christopher Clardy

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Flora recently received a mail from a bank that contained a malicious link along with some instructions. The malicious link redirected her to a form requesting details such as her name, phone number, date of birth, credit card number, CVV code, SNNs, and email address.

Identify the type of cybercrime being performed on Flora in the above scenario.

Phishing

Espionage

Brute-force attack

Privilege escalation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane, a disgruntled employee of an organization, was waiting for an opportunity to target the organization. One day, he gained access to the project manager’s system and copied all the secret codes to his portable device. After copying, Kane handed over the code to a rival company, which released the software to the public with their proprietary patents.

Identify the type of attack Kane has launched in the above scenario

Trojan horse attack

Privilege escalation attack

Intellectual property theft

Data manipulation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following acts contains Article 32, which deals with technical and organizational measures to encrypt personal data and ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services?

PCI–DSS

GDPR

HIPAA

GLBA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following phases of a forensic investigation involves acquiring, preserving, and analyzing evidence found in the crime scene to identify the culprit?

Planning and budgeting phase

Investigation phase

Post-investigation phase

Pre-investigation phase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the member of an investigation team who provides legal advice on conducting the investigation and addresses the legal issues involved in the forensic investigation process.

Incident analyzer

Evidence manager

Attorney

Photographer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?