C S+ U11

C S+ U11

11th Grade

20 Qs

quiz-placeholder

Similar activities

OCR GCSE - Protocols

OCR GCSE - Protocols

11th - 12th Grade

16 Qs

Network Topologies

Network Topologies

1st - 12th Grade

20 Qs

Understanding RAID Concepts and Levels

Understanding RAID Concepts and Levels

10th Grade - University

15 Qs

Code.org AP CSP Unit 2: The Internet

Code.org AP CSP Unit 2: The Internet

9th - 12th Grade

16 Qs

AP CSP Internet

AP CSP Internet

9th - 12th Grade

21 Qs

Unit 2 Vocab

Unit 2 Vocab

9th - 12th Grade

16 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

Networking Vocab

Networking Vocab

9th - 12th Grade

17 Qs

C S+ U11

C S+ U11

Assessment

Quiz

Computers

11th Grade

Hard

Created by

LTC Jimmy Thomas

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following solutions typically consists of physical storage devices or networked data centers that are created and maintained locally?

Storage Area Network (SAN)

Network-Attached Storage (NAS)

Onsite backup

Offsite backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In command line, what command would be used to run a network exploration and security/port scan?

grep

ping

dig

nmap

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the best tool to use to utilize cryptographic tools?

OpenSSL

SSH

PowerShell

Python

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensics tool is used to copy everything from a file and then copy it to a separate storage device?

FTK imager

WinHex

Autopsy

Memdump

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command combines the results of ping and traceroute?

nslookup

arp

curl

pathping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a step to the acquisition of evidence?

Who has the evidence now?

Who collected the evidence?

Why was the evidence collected?

How was the evidence stored?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmad is conducting a digital investigation where he is looking through emails, business communications, and other data used by a company. What is this called?

E-Discovery

Preservation

Provenance

Nonrepudiation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?