
ISC2 - Chapter 4 - Module 2
Authored by Sebastian Zamorano
Computers
Professional Development
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does SIEM mean?
System Information and Event Manager
System Information and Enterprise Manager
Security Information and Event Manager
Security Information and Enterprise Manager
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack embeds malicious payload inside a reputable or trusted software?
Trojans
Phishing
Rootkits
DDOS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack has the PRIMARY objective controlling the system from outside?
Trojans
DDOS
Rootkits
Backdoors
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which devices would be more effective in detecting an intrusion into a network?
Firewalls
HIDS
NIDS
Anti-malware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack attempts to gain information by observing the device's power consumption?
Trojans
Side channels
DOS
Worm
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack will most effectively maintain remote access and control over the victim's computer?
Rootkits
Trojans
Phishing
Cross-Site Scripting
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?
DDOS
Trojan
Phishing
Side channel
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?