Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

University

48 Qs

quiz-placeholder

Similar activities

IT2112 Networking 1 Quiz 1

IT2112 Networking 1 Quiz 1

University

45 Qs

KELAS 2-REVIEW MATERI INFORMATIKA SM2

KELAS 2-REVIEW MATERI INFORMATIKA SM2

2nd Grade - University

50 Qs

CompTIA Security+ SY0-701 Revision Test 1

CompTIA Security+ SY0-701 Revision Test 1

University

50 Qs

MGMT 2080 - Exam 2

MGMT 2080 - Exam 2

University

43 Qs

quiz gusto turo ayaw?

quiz gusto turo ayaw?

University

50 Qs

22IT330_SE_Quiz 1_24.10.2025

22IT330_SE_Quiz 1_24.10.2025

University

45 Qs

Кәсіби ағылшын 201 - 250

Кәсіби ағылшын 201 - 250

University

50 Qs

Beginner's Guide to Pseudocode Structure

Beginner's Guide to Pseudocode Structure

8th Grade - University

50 Qs

Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Dr. Kushwaha

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle ensures that original digital evidence remains unchanged during forensic analysis?

Chain of Custody

Data Hashing

Evidence Integrity

Forensic Soundness

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the cyber forensics process directly involves reconstructing user actions from logs and memory dumps?

Collection

Analysis

Documentation

Preservation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The admissibility of digital evidence in court primarily depends on:

Cryptographic algorithms used

Chain of Custody maintenance

Amount of evidence gathered

Storage media type

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAM dumps and open TCP connections are classified as:

Non-volatile evidence

Network evidence

Volatile evidence

Application evidence

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber threat type is characterized by long-term, highly targeted, and stealthy attacks?

Social Engineering

Insider Threats

Advanced Persistent Threats (APTs)

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The equation “Threat + Vulnerability + Impact = Risk” best represents:

CIA Triad

Risk Analysis Model

Vulnerability Lifecycle

Exploit Chain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability type is MOST associated with timing issues in concurrent processes?

Buffer Overflow

Race Condition

Privilege Escalation

Input Validation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?