
Incident Management Policy and Security Report Quiz
Authored by Ghassan Sifri
Instructional Technology
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a best forensic practice for handling digital evidence?
Creating a verified copy of log files using a write-blocking tool
Deleting log files after extraction
Sharing log files without verification
Modifying log files to fit the investigation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to calculate and record a cryptographic hash (e.g., SHA-256) of files before and after extraction in forensic investigations?
To prove the data has not been altered
To make files easier to access
To reduce file size
To encrypt the files for security
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to best practice, what should happen to affected hardware after a security incident is identified?
It should be isolated and preserved for forensic examination
It should be immediately replaced
It should be left operating as usual
It should be upgraded to the latest model
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the risk of not formally preserving CCTV evidence after an incident?
The footage could be permanently lost if not exported and preserved promptly
The footage will automatically be backed up
The footage will be encrypted for security
The footage will be made public
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which improvement is suggested to address the issue of legal staff being unavailable during weekends?
Implement a formal digital evidence handling procedure
Establish a formal out-of-hours response arrangement
Require immediate isolation of affected hardware
Increase the number of legal staff during weekdays
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the document, what is a critical reason for having a formal digital evidence handling procedure in an organization?
To ensure evidence is collected consistently regardless of which technician is on duty
To allow evidence to be accessed by anyone at any time
To reduce the number of incidents occurring at weekends
To make evidence handling less formal
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of a named PR contact in the out-of-hours response arrangement?
To handle visitor-facing communications
To extract digital evidence
To authorize containment actions
To calculate cryptographic hashes
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?