Search Header Logo

QUIZ 03 CS211

Authored by Aahely Dilshan

Information Technology (IT)

University

Used 1+ times

QUIZ 03 CS211
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best distinguishes data erasure from data remanence?

Erasure ensures data is unrecoverable, while remanence refers to residual recoverable traces.

Both guarantee permanent data deletion.

Erasure only applies to cloud data, while remanence applies to physical drives.

Remanence encrypts the data, while erasure deletes encryption keys.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company uses incremental backups daily and a full backup weekly. If Wednesday's incremental is lost, restoring data requires:

Only the last full backup

The last full backup and Wednesday's incremental

The last full backup and all incrementals except Wednesday's

Re-running the entire backup chain from scratch

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which scenario best demonstrates data masking rather than encryption?

Storing customer credit card numbers as hashes in a database

Showing only the last 4 digits of a credit card on an e-commerce site

Encrypting all employee emails with TLS

Encrypting patient records in a hospital database

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack directly exploits the ARP protocol's trust model?

Evil Twin Attack

ARP Spoofing

Bluejacking

Wi-Fi Jamming

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In an RBAC (Role-Based Access Control) model, access permissions are primarily based on:

Ownership of resources

Central security labels assigned to files

The role assigned to a user within an organization

Dynamic behavior of processes

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which OS security feature makes return address overwrite attacks significantly harder to exploit?

Stack Canaries

File ACLs

BitLocker

Reference Monitor

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During digital forensic acquisition, why must investigators use write blockers?

To speed up the copying process

To prevent accidental modification of original evidence

To increase the storage size of acquired media

To encrypt evidence before analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?