quiz 1

quiz 1

University

5 Qs

quiz-placeholder

Similar activities

Animation Techniques Quiz

Animation Techniques Quiz

10th Grade - University

10 Qs

ADBM_Quiz_2_C

ADBM_Quiz_2_C

University

10 Qs

End-Digital Marketing

End-Digital Marketing

University

10 Qs

CPU Architecture and Functionality Concepts

CPU Architecture and Functionality Concepts

11th Grade - University

10 Qs

MM-Intro

MM-Intro

University

10 Qs

Information Management

Information Management

University

10 Qs

CHFI Module 1

CHFI Module 1

University

10 Qs

CS10337 - Lecture #3

CS10337 - Lecture #3

University

10 Qs

quiz 1

quiz 1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Christopher Clardy

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Flora recently received a mail from a bank that contained a malicious link along with some instructions. The malicious link redirected her to a form requesting details such as her name, phone number, date of birth, credit card number, CVV code, SNNs, and email address.

Identify the type of cybercrime being performed on Flora in the above scenario.

Phishing

Espionage

Brute-force attack

Privilege escalation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane, a disgruntled employee of an organization, was waiting for an opportunity to target the organization. One day, he gained access to the project manager’s system and copied all the secret codes to his portable device. After copying, Kane handed over the code to a rival company, which released the software to the public with their proprietary patents.

Identify the type of attack Kane has launched in the above scenario

Trojan horse attack

Privilege escalation attack

Intellectual property theft

Data manipulation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following acts contains Article 32, which deals with technical and organizational measures to encrypt personal data and ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services?

PCI–DSS

GDPR

HIPAA

GLBA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following phases of a forensic investigation involves acquiring, preserving, and analyzing evidence found in the crime scene to identify the culprit?

Planning and budgeting phase

Investigation phase

Post-investigation phase

Pre-investigation phase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the member of an investigation team who provides legal advice on conducting the investigation and addresses the legal issues involved in the forensic investigation process.

Incident analyzer

Evidence manager

Attorney

Photographer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?