AP CK CyberSecurity Unit 5

AP CK CyberSecurity Unit 5

12th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz sobre P5.js e JavaScript

Quiz sobre P5.js e JavaScript

1st Grade - University

8 Qs

ԹԳՀԳ

ԹԳՀԳ

7th Grade - University

10 Qs

Tes Formatif Perangkat lunak audio

Tes Formatif Perangkat lunak audio

12th Grade

10 Qs

Protecting Information Online

Protecting Information Online

3rd Grade - University

12 Qs

Arduino Basics: Inputs and Outputs Quiz

Arduino Basics: Inputs and Outputs Quiz

12th Grade - University

11 Qs

3TDS - Programação Frontend - Recuperação 2

3TDS - Programação Frontend - Recuperação 2

12th Grade

10 Qs

Quiz sobre Implementación de Soluciones Web y Multimedia

Quiz sobre Implementación de Soluciones Web y Multimedia

12th Grade

15 Qs

Diagramas de casos de uso y clases

Diagramas de casos de uso y clases

12th Grade

10 Qs

AP CK CyberSecurity Unit 5

AP CK CyberSecurity Unit 5

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Medium

Created by

Kristina Rice

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a hidden temporary version of a file created when a user accesses that file?

Archived data

Metadata

Encrypted data

Active data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigator is responding to a cyber attack. They are evaluating information about a file, including:

Who created the file

When the file was last modified

Who last modified the file

What type of data is the investigator reviewing?

Metadata

Archived data

Residual data

Active data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a host-based indicator of compromise (IoC)?

Suspicious file hashes detected on a recently downloaded file

Unexpected processes or services running

Multiple failed log-in attempts to a system

Unauthorized attempts to access sensitive data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is looking into a cyber incident and notices the following discrepancies.

There are numerous failed log-in attempts to a device during the time of the incident

The log-in times for these failed log-ins took place when users were typically not logged on

Once the adversary got into the system, they attempted to elevate their privileges on the system

Which type of indicator of compromise (IoC) was the network administrator investigating?

Host-based IoC

File-based IoC

Behavior-based IoC

Memory-based IoC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following containment measures is used to help stop a cyber attack from spreading from an infected host to other clean hosts on a network?

Backing up any critical information to a secure location

Disabling Bluetooth and Wi-Fi connections

Implementing multi-factor authentication

Monitoring network traffic for unusual activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network technician is working on a device and completes the following steps.

  1. 1)They backup any critical files on a system

  2. 2)They wipe the system clean

  3. 3)They reinstall a fresh operating system

  4. 4)They restore the backed-up files to the device

  5. What is the primary purpose of completing these steps?

They are removing malware from an infected computer

They are creating a test environment for new applications

They are setting up the system for a new user

They are installing software to improve cybersecurity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is creating a backup site for an office to prepare for potential future cyber incidents. The backup site must adhere to the following requirements.

The site has utility access, but will need to be turned on in the event of using it

The site is a room with no devices that will need to be set up in case it is needed

The site needs to be a cost effective place to maintain when it is not in use

Which type of backup site is the network administrator setting up?

Hot site

Warm site

Lukewarm site

Cold site

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?