NF Quiz#1

NF Quiz#1

University

30 Qs

quiz-placeholder

Similar activities

98-366 Lesson 2 OSI Model

98-366 Lesson 2 OSI Model

10th Grade - University

33 Qs

OSI yuk

OSI yuk

10th Grade - University

25 Qs

Networking

Networking

University

26 Qs

Quiz 2 (Module 3) - BSIT 2-2

Quiz 2 (Module 3) - BSIT 2-2

University

25 Qs

Kuis Jaringan Komputer - OSI Layer

Kuis Jaringan Komputer - OSI Layer

University

25 Qs

OSI Model

OSI Model

10th Grade - University

25 Qs

Jaringan Komunikasi Data

Jaringan Komunikasi Data

University

25 Qs

TES PENYEGARAN

TES PENYEGARAN

University

25 Qs

NF Quiz#1

NF Quiz#1

Assessment

Quiz

Computers

University

Medium

Created by

Dean Mark M. Molde

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You’re investigating a suspicious file download on a corporate network. What’s your first step?

Analyze the file directly

Collect network logs and packet captures

Shut down the entire network

Interview all employees

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A network attack occurred, and you need to preserve evidence. What is the most important factor?

Prioritize speed over accuracy

Ensure proper chain of custody

Block all traffic on the network

Use free tools without documentation

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What kind of evidence is captured during a live analysis?

Static evidence

Dynamic evidence

Physical evidence

Metadata evidence

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are tasked to analyze a firewall log. What should you focus on to identify a potential intrusion?

Unusual port usage

DNS resolution success rates

User login frequencies

File size logs

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which step is essential before analyzing packet captures?

Convert them into a document format

Verify their integrity and authenticity

Filter out small packets

Compress the file

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A network tap is most useful for which activity?

Creating static disk images

Capturing and preserving live network traffic

Securing the physical premises

Training forensic analysts

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If different systems record events with varying time stamps, what action should you take?

Ignore time discrepancies

Synchronize logs to a common time reference

Focus only on logs with exact times

Collect new logs with identical formats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?