Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
Lily is the location manager of AK, a clothing line operating nationwide. AK recently suffered a cyber security breach, the extent and damage of which still remains unclear. All the managers of AK have agreed that an investigation should be carried out as to find out the extent of the breach and the person responsible for it. The management of AK plans to take the culprit to court and hence requires this investigation to collect sufficient evidence for prosecution.
Lily has previously experienced such breaches and knows that the breach and its investigation can be on three different levels. She has prepared a question to put to the investigator regarding all three levels.
“Question number 3: Has the threat affected data stored by the organization?”
Question number 3 relates to which level of the investigation?
CorrectIncorrect -
Question 2 of 15
2. Question
Which of the following types of penetration testing is carried out from the user’s point of view?
CorrectIncorrect -
Question 3 of 15
3. Question
The application of science or technology to investigate crime, including the cause and consequences, is called:
CorrectIncorrect -
Question 4 of 15
4. Question
Lily is the location manager of AK, a clothing line operating nationwide. AK recently suffered a cyber security breach, the extent and damage of which still remains unclear. All the managers of AK have agreed that an investigation should be carried out as to find out the extent of the breach and the person responsible for it. The management of AK plans to take the culprit to court and hence requires this investigation to collect sufficient evidence for prosecution.
Lily has previously experienced such breaches and knows that the breach and its investigation can be on three different levels. She has prepared a question to put to the investigator regarding all three levels.
“Question number 1: Has the threat affected the entire system or just certain parts of it?”
The above question relates to which level of the investigation?
CorrectIncorrect -
Question 5 of 15
5. Question
Which of the following correctly defines IPSEC?
CorrectIncorrect -
Question 6 of 15
6. Question
Frampton Ltd is an electronics company, the firm specialises in producing smartphones.
Frampton’s largest competitor has just launched a revolutionary smartphone which can be fully charged in under 20 minutes. This new technology has been brought about by a new battery design.
The project team for Frampton’s latest product, the “xPhone”, has purchased a bulk order of their competitor’s phone in the hope of taking apart the phone and understanding the unique battery technology so they can apply the same technology to the xPhone.
Which of the following terms best describes the activity that Frampton Ltd is carrying out?
CorrectIncorrect -
Question 7 of 15
7. Question
The SOC (System and Organization Controls) for Cybersecurity framework was developed by the AICPA (American Institute of Certified Professional Accountants) in 2017.
There are three components to a SOC for Cybersecurity report.
Which of the following are components of a SOC for Cybersecurity report?
Select THREE that apply:
CorrectIncorrect -
Question 8 of 15
8. Question
Which of the following is a useful way of understanding how a code behind a malware works?
CorrectIncorrect -
Question 9 of 15
9. Question
Forensic analysis operates at which level:
CorrectIncorrect -
Question 10 of 15
10. Question
Zerg Ltd is an online retailer of sports supplements, the firm is large and the website deals with a heavy amount of users each day and so it is important that the website operates smoothly.
Following a disagreement with a customer, the website was subject to a denial-of-service (DDoS) attack which put the website under strain and resulted in two-days of downtime, costing the firm over £2m in lost sales. Contractors from a specialist cybersecurity firm had to be used to fix the issue.
The firm’s management is currently putting together the SOC (System and Organization Controls) for Cybersecurity report. As part of this, management is focusing on the nine categories of decision criteria that they will consider as part of the description criteria component of the report.
Under which category will the DDoS attack be reported?
CorrectIncorrect -
Question 11 of 15
11. Question
Palo PLC is an online gambling firm, the firm operates a portfolio of websites that allow users to bet on horse races, sporting events and even political elections.
Recently, a customer of Palo PLC lost a substantial amount of money on a sports bet. The customer sought revenge on the firm by launching a series of denial-of-service (DDoS) attacks which slowed several of Palo’s websites down and cost the firm £5m in lost revenues due to website downtime.
After the attack ended, Palo PLC’s IT team launched a forensic analysis into the attack.
Which of the following are valid reasons for carrying out the forensic analysis after the cyberattack?
Select ALL that apply:
CorrectIncorrect -
Question 12 of 15
12. Question
Which of the following correctly defines MIKEY-SAKKE?
CorrectIncorrect -
Question 13 of 15
13. Question
The UK National Cyber Security Centre suggest that risk management techniques within a cybersecurity risk management plan (CRMP) should be:
CorrectIncorrect -
Question 14 of 15
14. Question
Bluelabs Ltd is a cybersecurity consulting firm, the firm operates in the UK and has many major clients across the world.
The firm’s most popular service is penetration testing, the firm offers a complete package and ensures that a thorough and extensive check for vulnerabilities is carried out.
What type of hacker group does Bluelabs Ltd belong to?
CorrectIncorrect -
Question 15 of 15
15. Question
Which one of the following activities would you not expect to see as part of a forensic analysis into a cyber security breach due to malware?
CorrectIncorrect