0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. _____________ security analysts help to protect an organization by employing a range of technologies and processes to prevent, detect and manage cyber threats.
2. Information security _____________ are in charge of developing and implementing security measures for their organization.
3. Digital ______________ examiner use specialised methods and techniques to recover and examine data from computer systems.
4. Information ___________ auditors help organizations by protecting their internal controls and data within their technology system.
5. A security __________ administrator handles all aspects of information security and protects the virtual data resources of a company.
6. __________testers simulate cyberattacks in order to identify and report security flaws on computer systems, networks, and infrastructure.
7. ___________ engineer design the systems to keep a company’s computers, networks, and data safe from everything from cyber attacks to natural disasters.
8. A cybersecurity ____________ is responsible for designing, creating, and maintaining the security systems within an organization’s IT network, including the computer systems and data.
9. The _______________ information security officer is a senior-level executive responsible for developing and implementing an information security program.
10. A bug bounty program, also known as a _____________ rewards program.
11. Cyber ____________ is a process of extracting data as proof of a crime while following proper investigation rules to nab the culprit by presenting the evidence to the court.
12. ____________ forensics involves monitoring and analyzing the network traffic to and from the criminal’s network.
13. ___________ forensics involves hacking related crimes.
14. ____________ forensics deals with collecting data from the cache and RAM in raw and then retrieving information from that data.
15. ____________ forensics involves extracting data from storage media by searching modified, active, or deleted files.