TestOut PC Pro - 14.2 Incident Response and Regulated Data

TestOut PC Pro - 14.2 Incident Response and Regulated Data

8th Grade

10 Qs

quiz-placeholder

Similar activities

เริ่มต้นกับบอร์ดสมองกลฝังตัว

เริ่มต้นกับบอร์ดสมองกลฝังตัว

8th Grade

11 Qs

[RB3-Ch9] Application of Computers

[RB3-Ch9] Application of Computers

8th Grade

15 Qs

Quiz 9 (15.09.2021)

Quiz 9 (15.09.2021)

1st - 12th Grade

10 Qs

Technology Week HTG Quiz - Monday

Technology Week HTG Quiz - Monday

7th - 12th Grade

10 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

Excel intermedio

Excel intermedio

6th - 8th Grade

11 Qs

Начала программирования на языке Паскаль

Начала программирования на языке Паскаль

8th - 11th Grade

15 Qs

DISPOSITIVOS DE ENTRADA Y DE SALIDA

DISPOSITIVOS DE ENTRADA Y DE SALIDA

6th - 9th Grade

12 Qs

TestOut PC Pro - 14.2 Incident Response and Regulated Data

TestOut PC Pro - 14.2 Incident Response and Regulated Data

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

Rossana Mero

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As part of the response to a security incident on your company network, you have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court. Which document have been asked to draft?

CPS (Certificate Practice Statement)

FIPS-140

Chain of custody

Rules of evidence

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You work for a company that offers their services through the internet. It is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next step you need to perform in response to the security incident?

Identify the issue further.

Secure the affected system.

Investigate how the attack occurred.

Eradicate the issue.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security incident is currently occurring on your company's network. You discover that the attack involves a computer system that is attached to the network. You are unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST?

Stop the attack and contain the damage by disconnecting the system from the network.

Document and photograph the entire crime scene, including the current state of the attached computer system.

Determine whether you have the expertise to conduct an investigation or whether you need to call in additional help.

Examine the active computer system to analyze the live network connection, memory contents, and running programs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an important aspect of evidence gathering in response to a security incident?

Purge transaction logs.

Monitor user access to compromised systems.

Restore damaged data from backup media.

Back up all log files and audit trails.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?

Copying the contents of memory to removable media

Disconnecting the system from the network

Shutting down the system

Restricting physical access to the system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician was able to stop a security attack on a user's computer. Which of the following actions should be performed FIRST when conducting the subsequent forensic investigation?

Document what is on the screen.

Stop all running processes.

Turn off the system.

Remove the hard drive.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As the principal of a private school, you have discovered that an office assistant has shared a student's home address with an unauthorized individual. Which of the following regulations is your school in violation of?

SOX

HIPAA

CCPA

FERPA

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?