ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

Basics of Cybersecurity

Basics of Cybersecurity

Professional Development

15 Qs

Sécurité d'un SI - CC1 V4

Sécurité d'un SI - CC1 V4

Professional Development

12 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Cyber security and Data protection Test

Cyber security and Data protection Test

Professional Development

20 Qs

SEC+ Ch.6 Review Test

SEC+ Ch.6 Review Test

Professional Development

15 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sebastian Zamorano

Used 20+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SIEM mean?

System Information and Event Manager

System Information and Enterprise Manager

Security Information and Event Manager

Security Information and Enterprise Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack embeds malicious payload inside a reputable or trusted software?

Trojans

Phishing

Rootkits

DDOS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack has the PRIMARY objective controlling the system from outside?

Trojans

DDOS

Rootkits

Backdoors

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which devices would be more effective in detecting an intrusion into a network?

Firewalls

HIDS

NIDS

Anti-malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to gain information by observing the device's power consumption?

Trojans

Side channels

DOS

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack will most effectively maintain remote access and control over the victim's computer?

Rootkits

Trojans

Phishing

Cross-Site Scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?

DDOS

Trojan

Phishing

Side channel

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?