Question 1
Question
Computer forensics is currently integrated as a vital part of the justice system.
Question 2
Question
In what order are the five main characteristics of computer forensics executed?
Answer
-
Identification, Preservation, Analysis, Documentation, Presentation
-
Preservation, Documentation, Identification, Analysis, Presentation
-
Documentation, Identification, Preservation, Analysis, Presentation
-
Presentation, Documentation, Analysis, Preservation, Identification
Question 3
Question
[blank_start]Sealing[blank_end] is usually the first step in preserving digital evidence
Question 4
Question
Data and privacy security are the same thing?
Question 5
Question
How can you protect your privacy?
Question 6
Question
Privacy can be attacked if the passwords of accounts are [blank_start]weak[blank_end] and [blank_start]simple[blank_end].
Question 7
Question
You have a role in Cyber Security aspects of Cyberwarfare?
Question 8
Question
Which one of the choices is NOT one of the three layers of Cyberspace?
Answer
-
Physical Network Layer
-
Logical Network Layer
-
Social Network Layer
-
Cyber-Persona Layer
Question 9
Question
What are some ways to combat cyber warfare-related threats?
Question 10
Question
Cybersecurity in healthcare involves the protection of electronic information and assets from unauthorized access, use, and disclosure of [blank_start]PHI[blank_end] and [blank_start]PII[blank_end].
Question 11
Question
Cybersecurity in healthcare is important for protecting patient safety and privacy
Question 12
Question
What issue accounts for nearly one-third of healthcare data breaches?
Answer
-
Employee Error
-
Encryption Blind Spots
-
Phishing Attacks
-
Misleading Websites
Question 13
Question
Mobile Security is the protection of [blank_start]smartphones[blank_end], [blank_start]tablets[blank_end], [blank_start]laptops[blank_end], and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
Answer
-
smartphones
-
tablets
-
laptops
-
smartphones
-
tablets
-
laptops
-
smartphones
-
laptops
-
tablets
Question 14
Question
What is one way to keep your mobile devices locked?
Answer
-
Pin
-
Password
-
Pattern
-
Biometrics
Question 15
Question
Free public WIFI is safe to use
Question 16
Question
[blank_start]Physical[blank_end] and [blank_start]Behavioral[blank_end] are the two main types of Biometric Identifiers
Question 17
Question
Who invented the classification system for fingerprints?
Answer
-
Vint Cerf
-
Sir Francis Galton
-
Bob Kahn
-
Sir Tim Berners-Lee
Question 18
Question
Which of the following is not a Behavioral Identifier?
Answer
-
Facial recognition
-
Typing pattern
-
Walking gait
-
Physical gestures
Question 19
Question
Please select the most effective attacks employed by hackers when targeting an organization.
Answer
-
Spear-phishing
-
Worms
-
Watering hole attacks
-
Trojan Horses
Question 20
Question
What percentage of security breaches are caused by human error?
Question 21
Question
Fill in the Blank
A. Builds understanding of risks and provides necessary steps to mitigate them
B. Password policies, multi-factor authentication, and mobile device management
C. Completion of required training, policy compliance, etc.
D. Being aware and prepared
E. Exhibiting habits based on strong security guidelines
Question 22
Question
Blockchains use ____ to secure the blocks in the chain and store the ____ of the previous block to prevent tampering.
Answer
-
Hasing, hash
-
Salting, salt
-
Encryption, data
-
Ledgers, ledger
Question 23
Question
[blank_start]Mining[blank_end] is the process of finding the next block in the chain
Question 24
Question
Each block in a chain contains a unique hash that is unrelated to the previous block in the chain
Question 25
Question
By storing resources in "the cloud", users can____
Answer
-
Increase performance
-
Save Costs
-
Increase speed
Question 26
Question
What is the most widely used type of cloud?
Question 27
Question
How is "the cloud" made more secure?
Answer
-
Good organization
-
Unchecked authority
-
No privacy control
Question 28
Question
A firewall is a [blank_start]tool[blank_end] used to [blank_start]monitor[blank_end] and [blank_start]filter[blank_end] network [blank_start]traffic[blank_end].
Answer
-
tool
-
monitor
-
filter
-
traffic
Question 29
Question
What are the different types of firewalls?
Answer
-
Host-based
-
GPU-based
-
Network-based
-
Router-based
Question 30
Question
What are the benefits/uses of a VPN?
Answer
-
better security
-
remote access
-
privacy
Question 31
Question
[blank_start]PPTP[blank_end], [blank_start]L2TP[blank_end], [blank_start]SSTP[blank_end], and [blank_start]OpenVPN[blank_end] are just some VPN protocols?
Question 32
Question
HIPPA contains two rules: HIPPA [blank_start]Privacy[blank_end] Rule and HIPPA [blank_start]Security[blank_end] Rule.
Question 33
Question
HIPPA requires [blank_start]regulations[blank_end] protecting the [blank_start]privacy[blank_end] and [blank_start]security[blank_end] of certain [blank_start]health information[blank_end].
Answer
-
regulations
-
privacy
-
security
-
health information
Question 34
Question
[blank_start]HTTP[blank_end], [blank_start]DNS[blank_end], and [blank_start]TCP/IP[blank_end] are all examples of application layer protocols.
Question 35
Question
What are HTTP Response Codes?
Question 36
Question
Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system.
Question 37
Question
The Principle of Least Privilege means subjects only have access to objects necessary to complete job