Search Header Logo

ISC2 - Chapter 4 - Module 2

Authored by Sebastian Zamorano

Computers

Professional Development

Used 21+ times

ISC2 - Chapter 4 - Module 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SIEM mean?

System Information and Event Manager

System Information and Enterprise Manager

Security Information and Event Manager

Security Information and Enterprise Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack embeds malicious payload inside a reputable or trusted software?

Trojans

Phishing

Rootkits

DDOS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack has the PRIMARY objective controlling the system from outside?

Trojans

DDOS

Rootkits

Backdoors

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which devices would be more effective in detecting an intrusion into a network?

Firewalls

HIDS

NIDS

Anti-malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to gain information by observing the device's power consumption?

Trojans

Side channels

DOS

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack will most effectively maintain remote access and control over the victim's computer?

Rootkits

Trojans

Phishing

Cross-Site Scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?

DDOS

Trojan

Phishing

Side channel

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?