CySA+ Days 7 & 8

CySA+ Days 7 & 8

University

36 Qs

quiz-placeholder

Similar activities

Big Data & E-Science Long Quiz

Big Data & E-Science Long Quiz

University

35 Qs

Canva

Canva

University

35 Qs

Productivity Tools - Microsoft Excel

Productivity Tools - Microsoft Excel

University

35 Qs

Educational Technology Quiz

Educational Technology Quiz

University

40 Qs

Network Fundamentals

Network Fundamentals

University

38 Qs

VF2 Haas Vertical Mill - General Concepts (Conceptos Generales)

VF2 Haas Vertical Mill - General Concepts (Conceptos Generales)

University

31 Qs

SASIS SEPEDA MOTOR KELAS XII

SASIS SEPEDA MOTOR KELAS XII

University

40 Qs

OCR Cambridge National ICT LO3

OCR Cambridge National ICT LO3

KG - Professional Development

34 Qs

CySA+ Days 7 & 8

CySA+ Days 7 & 8

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Joshua Renihan

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A record of a problem reported by a user or detected by a system is known as a (blank).

Requirement

Incident

Trouble Ticket

IT issue

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term refers to a security event that compromises the Confidentiality, Integrity, or Availability of an information system.

Trouble Ticket

Breach

Incident

Change Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a forensic image?

A forensic image is a type of digital camera used in investigations.
A forensic image is a physical photograph taken at a crime scene.
A forensic image is a complete, exact copy of a digital storage device used for forensic analysis.
A forensic image is a software program for data recovery.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must you do prior to collecting forensic evidence during an incident response?

Establish a Chain of Custody

Obtain Authorization or Consent

Create a bit-by-bit copy of the storage device

Obtain a tamper-evident bag & seal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a forensic investigator perform periodically to safeguard the collected data against any accidental or intentional alterations during the investigation process?

Seal it in a tamper-evident bag

Store it in a secure location

Maintain a proper Chain of Custody

Conduct a Data Integrity Check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique can be used to provide a way to verify the authenticity and integrity of data during forensic investigations?

Use tamper tape

Store it in a secure location

Digitally sign a copy of it

Sprinkle salt on some hash browns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way a forensic investigator can validate the integrity of a physical device during an incident response?

Use tamper-evident seals

Store it in a secure foot locker

Keep it in a personal safe

Keep it under 24/7 surveillance

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?