Search Header Logo

CySA+ Days 7 & 8

Authored by Joshua Renihan

Instructional Technology

University

Used 10+ times

CySA+ Days 7 & 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A record of a problem reported by a user or detected by a system is known as a (blank).

Requirement

Incident

Trouble Ticket

IT issue

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term refers to a security event that compromises the Confidentiality, Integrity, or Availability of an information system.

Trouble Ticket

Breach

Incident

Change Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a forensic image?

A forensic image is a type of digital camera used in investigations.
A forensic image is a physical photograph taken at a crime scene.
A forensic image is a complete, exact copy of a digital storage device used for forensic analysis.
A forensic image is a software program for data recovery.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must you do prior to collecting forensic evidence during an incident response?

Establish a Chain of Custody

Obtain Authorization or Consent

Create a bit-by-bit copy of the storage device

Obtain a tamper-evident bag & seal

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a forensic investigator perform periodically to safeguard the collected data against any accidental or intentional alterations during the investigation process?

Seal it in a tamper-evident bag

Store it in a secure location

Maintain a proper Chain of Custody

Conduct a Data Integrity Check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique can be used to provide a way to verify the authenticity and integrity of data during forensic investigations?

Use tamper tape

Store it in a secure location

Digitally sign a copy of it

Sprinkle salt on some hash browns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way a forensic investigator can validate the integrity of a physical device during an incident response?

Use tamper-evident seals

Store it in a secure foot locker

Keep it in a personal safe

Keep it under 24/7 surveillance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?