ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

University

28 Qs

quiz-placeholder

Similar activities

P03JARKOM

P03JARKOM

University

25 Qs

Module 3 - Security Architecture

Module 3 - Security Architecture

University

25 Qs

Aptitude Competition(FY)

Aptitude Competition(FY)

University

25 Qs

Css-BoxModel

Css-BoxModel

University

25 Qs

2B. Active Reconnaissance - Enumeration

2B. Active Reconnaissance - Enumeration

University

24 Qs

Review 32 - Will/going to

Review 32 - Will/going to

University

25 Qs

Atividade sobre Modelos de Processo de Software

Atividade sobre Modelos de Processo de Software

University

25 Qs

Modeling & Rendering

Modeling & Rendering

University

24 Qs

ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Sebastian Zamorano

Used 45+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______?

Incident
Event
Attack
Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______?

Risk management
Incident detection
Malware
Disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________?

Exploit
Intrusion
Event
Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a privacy breach?

Unavailability of critical systems
Access of private information by an unauthorized person
Any observable occurrence in a network or system
Being exposed to the possibility of attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______?

Malware
Critical
Intrusion
Zero-day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of documentation exists for zero-day vulnerabilities?

CVSS
APT
CVE
None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Incident?

A potentially dangerous event
A new malware
Any event
A dangerous exploit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers