
QUIZ 03 CS211
Authored by Aahely Dilshan
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best distinguishes data erasure from data remanence?
Erasure ensures data is unrecoverable, while remanence refers to residual recoverable traces.
Both guarantee permanent data deletion.
Erasure only applies to cloud data, while remanence applies to physical drives.
Remanence encrypts the data, while erasure deletes encryption keys.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company uses incremental backups daily and a full backup weekly. If Wednesday's incremental is lost, restoring data requires:
Only the last full backup
The last full backup and Wednesday's incremental
The last full backup and all incrementals except Wednesday's
Re-running the entire backup chain from scratch
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which scenario best demonstrates data masking rather than encryption?
Storing customer credit card numbers as hashes in a database
Showing only the last 4 digits of a credit card on an e-commerce site
Encrypting all employee emails with TLS
Encrypting patient records in a hospital database
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack directly exploits the ARP protocol's trust model?
Evil Twin Attack
ARP Spoofing
Bluejacking
Wi-Fi Jamming
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In an RBAC (Role-Based Access Control) model, access permissions are primarily based on:
Ownership of resources
Central security labels assigned to files
The role assigned to a user within an organization
Dynamic behavior of processes
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which OS security feature makes return address overwrite attacks significantly harder to exploit?
Stack Canaries
File ACLs
BitLocker
Reference Monitor
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During digital forensic acquisition, why must investigators use write blockers?
To speed up the copying process
To prevent accidental modification of original evidence
To increase the storage size of acquired media
To encrypt evidence before analysis
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?