ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Mothers Competition

Mothers Competition

Professional Development

10 Qs

Power Apps Introduction

Power Apps Introduction

Professional Development

10 Qs

NM-BIG DATA Course

NM-BIG DATA Course

Professional Development

20 Qs

3D Objects - Terms & Transfomations

3D Objects - Terms & Transfomations

6th Grade - Professional Development

20 Qs

Digital Technology Office 365 - 29May2020

Digital Technology Office 365 - 29May2020

University - Professional Development

13 Qs

Email of request

Email of request

12th Grade - Professional Development

11 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

Topic Quiz-1 : Python Basics

Topic Quiz-1 : Python Basics

Professional Development

10 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Sebastian Zamorano

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SIEM mean?

System Information and Event Manager

System Information and Enterprise Manager

Security Information and Event Manager

Security Information and Enterprise Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack embeds malicious payload inside a reputable or trusted software?

Trojans

Phishing

Rootkits

DDOS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack has the PRIMARY objective controlling the system from outside?

Trojans

DDOS

Rootkits

Backdoors

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which devices would be more effective in detecting an intrusion into a network?

Firewalls

HIDS

NIDS

Anti-malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to gain information by observing the device's power consumption?

Trojans

Side channels

DOS

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack will most effectively maintain remote access and control over the victim's computer?

Rootkits

Trojans

Phishing

Cross-Site Scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?

DDOS

Trojan

Phishing

Side channel

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?