Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

University

48 Qs

quiz-placeholder

Similar activities

SOC Analyst Hard-Level MCQs

SOC Analyst Hard-Level MCQs

University

52 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

50 Qs

Educational Technology in the Asia Pacific Region

Educational Technology in the Asia Pacific Region

University

50 Qs

PRELIM EXAMINATION ON LIVING IN THE IT ERA

PRELIM EXAMINATION ON LIVING IN THE IT ERA

University

50 Qs

ASESMEN SUMATIF AKHIR TAHUN - INFORMATIKA KELAS VIII

ASESMEN SUMATIF AKHIR TAHUN - INFORMATIKA KELAS VIII

8th Grade - University

50 Qs

A+ Core II Days 7-9

A+ Core II Days 7-9

University

44 Qs

Module 2: Attacks, Concepts, and Techniques

Module 2: Attacks, Concepts, and Techniques

University

52 Qs

Dampak sosial Informatika LK1

Dampak sosial Informatika LK1

7th Grade - University

50 Qs

Cyber Analytics Quiz 1 & 2

Cyber Analytics Quiz 1 & 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Dr. Kushwaha

Used 2+ times

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle ensures that original digital evidence remains unchanged during forensic analysis?

Chain of Custody

Data Hashing

Evidence Integrity

Forensic Soundness

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the cyber forensics process directly involves reconstructing user actions from logs and memory dumps?

Collection

Analysis

Documentation

Preservation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The admissibility of digital evidence in court primarily depends on:

Cryptographic algorithms used

Chain of Custody maintenance

Amount of evidence gathered

Storage media type

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAM dumps and open TCP connections are classified as:

Non-volatile evidence

Network evidence

Volatile evidence

Application evidence

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber threat type is characterized by long-term, highly targeted, and stealthy attacks?

Social Engineering

Insider Threats

Advanced Persistent Threats (APTs)

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The equation “Threat + Vulnerability + Impact = Risk” best represents:

CIA Triad

Risk Analysis Model

Vulnerability Lifecycle

Exploit Chain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability type is MOST associated with timing issues in concurrent processes?

Buffer Overflow

Race Condition

Privilege Escalation

Input Validation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?