CySA+ Days 7 & 8

CySA+ Days 7 & 8

University

36 Qs

quiz-placeholder

Similar activities

Electrical Fire Safety Quiz

Electrical Fire Safety Quiz

University

35 Qs

2020 PAS PISAV XII TAV

2020 PAS PISAV XII TAV

University

40 Qs

iAIS | Midterm 2025

iAIS | Midterm 2025

University

38 Qs

HCI 323 - FINAL EXAM

HCI 323 - FINAL EXAM

University

33 Qs

Mega Quiz

Mega Quiz

7th Grade - Professional Development

36 Qs

Module 3-4 ICT QUIZ

Module 3-4 ICT QUIZ

12th Grade - University

36 Qs

General Translation Theory 2023

General Translation Theory 2023

University

40 Qs

carpentry unit 1

carpentry unit 1

University

38 Qs

CySA+ Days 7 & 8

CySA+ Days 7 & 8

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Joshua Renihan

Used 6+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A record of a problem reported by a user or detected by a system is known as a (blank).

Requirement

Incident

Trouble Ticket

IT issue

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term refers to a security event that compromises the Confidentiality, Integrity, or Availability of an information system.

Trouble Ticket

Breach

Incident

Change Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a forensic image?

A forensic image is a type of digital camera used in investigations.
A forensic image is a physical photograph taken at a crime scene.
A forensic image is a complete, exact copy of a digital storage device used for forensic analysis.
A forensic image is a software program for data recovery.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must you do prior to collecting forensic evidence during an incident response?

Establish a Chain of Custody

Obtain Authorization or Consent

Create a bit-by-bit copy of the storage device

Obtain a tamper-evident bag & seal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a forensic investigator perform periodically to safeguard the collected data against any accidental or intentional alterations during the investigation process?

Seal it in a tamper-evident bag

Store it in a secure location

Maintain a proper Chain of Custody

Conduct a Data Integrity Check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique can be used to provide a way to verify the authenticity and integrity of data during forensic investigations?

Use tamper tape

Store it in a secure location

Digitally sign a copy of it

Sprinkle salt on some hash browns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way a forensic investigator can validate the integrity of a physical device during an incident response?

Use tamper-evident seals

Store it in a secure foot locker

Keep it in a personal safe

Keep it under 24/7 surveillance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?