0% found this document useful (0 votes)
89 views8 pages

Module 2 Quiz - Chapters 1 and 2 - CYBR 365 Intro To Digital Forensics - Jan 2022 - Online

This document provides the details of a quiz assignment for an online course. It includes information such as the due date, point value, number of questions, allowed attempts, and instructions. An attempt history is also shown, with the student scoring 95% on their second attempt within the 15 minute time limit. The highest score of 95% will be recorded for the assignment grade.

Uploaded by

Sheeba Grace
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views8 pages

Module 2 Quiz - Chapters 1 and 2 - CYBR 365 Intro To Digital Forensics - Jan 2022 - Online

This document provides the details of a quiz assignment for an online course. It includes information such as the due date, point value, number of questions, allowed attempts, and instructions. An attempt history is also shown, with the student scoring 95% on their second attempt within the 15 minute time limit. The highest score of 95% will be recorded for the assignment grade.

Uploaded by

Sheeba Grace
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Due

Jan 24 at 12:59pm
Points
100
Questions
20
Time Limit
None
Allowed Attempts
2

Instructions
Module 2

Quiz
Chapters 1 & 2

Before the end of the module week, take the module quiz.
The purpose of the quiz is to assess your mastery of the
knowledge and skills presented in your assigned textbook
reading.

There is no time limit for this quiz. You will have two
attempts to take the quiz. The highest score will be entered
into the grade book. 

Grading: The quiz contains 20 multiple-choice and true-


false questions. Each question is worth five points. You will
see scores for the questions right away. Your score will be
reflected immediately in your Grades area. Please contact
your instructor if you have any questions.

 This activity supports Module Objectives 1 and 2 and Learning Outcomes 1, 2, and 4.

Attempt History
Attempt Time Score
KEPT Attempt 2
15 minutes 95 out of 100

LATEST Attempt 2
15 minutes 95 out of 100

Attempt 1
15 minutes 90 out of 100

Score for this attempt:


95 out of 100
Submitted Jan 23 at 9:36pm
This attempt took 15 minutes.

Question 1 5
/ 5 pts
The __________ was passed to improve the security and privacy of
sensitive information in federal computer systems. The law requires the
establishment of minimum acceptable security practices, creation of
computer security plans, and training of system users or owners of
facilities that house sensitive information.

 
Federal Privacy Act of 1974

 
Telecommunications Act of 1996

Correct!  
Computer Security Act of 1987

 
USA Patriot Act

Question 2 5
/ 5 pts

To avoid changing a computer system while examining it, make a


forensic copy and work with that copy.

 
False

Correct!  
True

Question 3 5
/ 5 pts

Internet forensics is the study of the source and content of email as


evidence.

 
True

Correct!  
False

Question 4 5
/ 5 pts

What term describes data about information, such as disk partition


structures and file tables?

Correct!  
Metadata

 
Potential storage

 
Volatile memory

 
Store data

Question 5 5
/ 5 pts

A sector is the basic unit of data storage on a hard disk, which is usually
64 KB.

 
True

Correct!  
False

Question 6 5
/ 5 pts

The __________ command is used to send a test network packet, or


echo packet, to a machine to determine if the machine is reachable and
how long the packet takes to reach the machine.

 
tracert

 
traceroute

Correct!  
ping

 
ipconfig

Question 7 5
/ 5 pts

Volatile memory is computer memory that requires power to maintain


the data it holds.

Correct!  
True

 
False

Question 8 5
/ 5 pts

Susan is a hacker. After breaking into a computer system and running


some hacking tools, she deleted several files she created to cover her
tracks. What general term describes Susan's actions?

 
Disk forensics

 
Live system forensics

Correct!  
Anti-forensics

 
Data transformation

Question 9 5
/ 5 pts

The Windows Registry is essentially a repository of all settings,


software, and parameters for Windows.

 
False

Correct!  
True

Question 10 5
/ 5 pts

Investigators must authenticate documentary evidence.

Correct!  
True

 
False

Question 11 5
/ 5 pts

Malware that executes damage when a specific condition is met is the


definition of __________.

Correct!  
logic bomb

 
denial of service (DoS) attack

 
rainbow table

 
SYN attack

Question 12 5
/ 5 pts

The term distributed denial of service (DDoS) attack describes the


process of connecting to a server that involves three packets being
exchanged.

 
True

Correct!  
False

Question 13 5
/ 5 pts

If an attacker doesn't spoof a MAC address, each packet sent in a denial


of service (DoS) attack contains evidence of the machine from which it
was launched.

Correct!  
True

 
False

Question 14 5
/ 5 pts

Ophcrack uses cross-site scripting to crack passwords.

Correct!  
False

 
True

Question 15 5
/ 5 pts

The use of electronic communications to harass or threaten another


person is the definition of __________.

 
rainbow table

 
logic bomb

 
denial of service (DoS) attack

Correct!  
cyberstalking

Question 16 0
/ 5 pts

Spyware software is legal, if used correctly.

orrect Answer  
False

ou Answered  
True

Question 17 5
/ 5 pts

__________ refers to phishing with a specific, high-value target in mind.


For example, the attacker may target the president or CEO of a
company.

 
Spear phishing

 
Bank fraud

 
Identity theft

Correct!  
Whaling

Question 18 5
/ 5 pts

Ophcrack is a tool that cracks local passwords on Windows systems.

 
False

Correct!  
True

Question 19 5
/ 5 pts

Ben was browsing reviews on a sporting goods website from which he


purchased items in the past. He saw a comment that read "Great price
on camping gear! Read my review." When he clicked the associated
link, a new window appeared and prompted him to log in again. What
type of attack is most likely underway?

Correct!  
Cross-site scripting (XSS)

 
SYN flood

 
Denial of service (DoS) attack

 
Spear phishing

Question 20 5
/ 5 pts

With respect to phishing, a good fictitious email gets a __________


response rate, according to the Federal Bureau of Investigation (FBI).

 
16 to 20 percent

 
7 to 10 percent

 
11 to 13 percent

Correct!  
1 to 3 percent

Quiz Score:
95 out of 100

You might also like