
AP CK CyberSecurity Unit 5
Authored by Kristina Rice
Information Technology (IT)
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a hidden temporary version of a file created when a user accesses that file?
Archived data
Metadata
Encrypted data
Active data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An investigator is responding to a cyber attack. They are evaluating information about a file, including:
Who created the file
When the file was last modified
Who last modified the file
What type of data is the investigator reviewing?
Metadata
Archived data
Residual data
Active data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a host-based indicator of compromise (IoC)?
Suspicious file hashes detected on a recently downloaded file
Unexpected processes or services running
Multiple failed log-in attempts to a system
Unauthorized attempts to access sensitive data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is looking into a cyber incident and notices the following discrepancies.
There are numerous failed log-in attempts to a device during the time of the incident
The log-in times for these failed log-ins took place when users were typically not logged on
Once the adversary got into the system, they attempted to elevate their privileges on the system
Which type of indicator of compromise (IoC) was the network administrator investigating?
Host-based IoC
File-based IoC
Behavior-based IoC
Memory-based IoC
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following containment measures is used to help stop a cyber attack from spreading from an infected host to other clean hosts on a network?
Backing up any critical information to a secure location
Disabling Bluetooth and Wi-Fi connections
Implementing multi-factor authentication
Monitoring network traffic for unusual activity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network technician is working on a device and completes the following steps.
1)They backup any critical files on a system
2)They wipe the system clean
3)They reinstall a fresh operating system
4)They restore the backed-up files to the device
What is the primary purpose of completing these steps?
They are removing malware from an infected computer
They are creating a test environment for new applications
They are setting up the system for a new user
They are installing software to improve cybersecurity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is creating a backup site for an office to prepare for potential future cyber incidents. The backup site must adhere to the following requirements.
The site has utility access, but will need to be turned on in the event of using it
The site is a room with no devices that will need to be set up in case it is needed
The site needs to be a cost effective place to maintain when it is not in use
Which type of backup site is the network administrator setting up?
Hot site
Warm site
Lukewarm site
Cold site
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Uji Pemahaman Microsoft Word
Quiz
•
10th Grade - University
10 questions
2TDS - Programação Frontend - 1002
Quiz
•
12th Grade
10 questions
Revisao
Quiz
•
12th Grade
10 questions
QUIZ 2 PLC
Quiz
•
10th Grade - University
12 questions
Fundamentals
Quiz
•
7th Grade - University
15 questions
Quiz 1-15
Quiz
•
9th - 12th Grade
14 questions
Google sheets
Quiz
•
7th Grade - University
10 questions
ONLINE ICT QUIZ, 2024
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
Predicting Products
Quiz
•
9th - 12th Grade
20 questions
Presidents Day challenge
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade
20 questions
Banking
Quiz
•
9th - 12th Grade