(Latest Update )
Cybersecurity Architecture and
Engineering | Questions and
Answers | Grade A | 100% Correct
(Verified Solutions)
Question:
A security team notices traffic coming from a country where the organization
does not have any business operations. Which of the following could this be
an indicator of?
A. High call volume
B. Odd network traffic
C. Geographic anomalies
D. Unauthorized changes
Answer:
C. Geographic anomalies
,Question:
A forensic analyst is creating a copy of evidence. Which stage of the forensics
process is this a part of?
A. Identification
B. Analysis
C. Collection
D. Presentation
Answer:
C. Collection
Question:
A forensic analyst is creating a copy of a hard drive to preserve evidence for an
investigation. The analyst uses hashing to ensure the integrity of the copied
data. Which stage of the forensics process does this activity belong to?
A. Identification
B. Analysis
C. Collection
D. Presentation
Answer:
C. Collection
,Question:
A first responder is securing a crime scene where digital evidence may be
present. Their first priority is ensuring the safety of personnel on site. Which
stage of the forensics process does this activity represent?
A. Identification
B. Analysis
C. Collection
D. Presentation
Answer:
A. Identification
Question:
A forensic expert is tasked with interpreting data retrieved from a suspect's
device, examining file structures, and identifying potential signs of
tampering. Which stage of the forensics process does this activity fall under?
A. Identification
B. Analysis
C. Collection
D. Presentation
Answer:
B. Analysis
, Question:
A forensic investigator is preparing a detailed report that outlines the tools
used, methods applied, and the findings from an investigation. This report
will be presented in court. Which stage of the forensics process is this?
A. Identification
B. Analysis
C. Collection
D. Presentation
Answer:
D. Presentation
Question:
A web administrator is looking at attacks where a malicious script is inserted
directly into an at-risk/vulnerable web application. What type of attack is
this?
A. Reflected XSS (stored cross-site scripting)
B. Stored XSS (stored cross-site scripting)
C. CSRF (Cross-Site Request Forgery)
D. Directory Traversal
Answer:
B. Stored XSS (stored cross-site scripting)