quiz 1

quiz 1

University

5 Qs

quiz-placeholder

Similar activities

IMSD_Week-1_CSE-1

IMSD_Week-1_CSE-1

University

10 Qs

Data Management and Storage

Data Management and Storage

University

10 Qs

VertexR Session

VertexR Session

University

10 Qs

G9- Problem Solving Stages Quiz

G9- Problem Solving Stages Quiz

9th Grade - University

10 Qs

Modelo OSI e TCP/IP (2)

Modelo OSI e TCP/IP (2)

10th Grade - University

10 Qs

Understanding APIs and Habit Tracker

Understanding APIs and Habit Tracker

2nd Grade - University

10 Qs

Pervasive Themes in IT

Pervasive Themes in IT

University

10 Qs

Untitled Quiz

Untitled Quiz

10th Grade - University

10 Qs

quiz 1

quiz 1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Christopher Clardy

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Flora recently received a mail from a bank that contained a malicious link along with some instructions. The malicious link redirected her to a form requesting details such as her name, phone number, date of birth, credit card number, CVV code, SNNs, and email address.

Identify the type of cybercrime being performed on Flora in the above scenario.

Phishing

Espionage

Brute-force attack

Privilege escalation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane, a disgruntled employee of an organization, was waiting for an opportunity to target the organization. One day, he gained access to the project manager’s system and copied all the secret codes to his portable device. After copying, Kane handed over the code to a rival company, which released the software to the public with their proprietary patents.

Identify the type of attack Kane has launched in the above scenario

Trojan horse attack

Privilege escalation attack

Intellectual property theft

Data manipulation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following acts contains Article 32, which deals with technical and organizational measures to encrypt personal data and ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services?

PCI–DSS

GDPR

HIPAA

GLBA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following phases of a forensic investigation involves acquiring, preserving, and analyzing evidence found in the crime scene to identify the culprit?

Planning and budgeting phase

Investigation phase

Post-investigation phase

Pre-investigation phase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the member of an investigation team who provides legal advice on conducting the investigation and addresses the legal issues involved in the forensic investigation process.

Incident analyzer

Evidence manager

Attorney

Photographer