ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

University

28 Qs

quiz-placeholder

Similar activities

week 7 sec+ quiz

week 7 sec+ quiz

12th Grade - Professional Development

27 Qs

IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

Cybersecurity Fundamentals Practice Quiz

Cybersecurity Fundamentals Practice Quiz

University

25 Qs

IAS 2 Asset Security Quiz 2

IAS 2 Asset Security Quiz 2

University

25 Qs

IT AUDIT and CONTROL

IT AUDIT and CONTROL

University

25 Qs

ALGOWAVE

ALGOWAVE

University

25 Qs

Chapters 13 and 14 IT Automation Review

Chapters 13 and 14 IT Automation Review

University

25 Qs

Information Assurance and Security Finals Long Test

Information Assurance and Security Finals Long Test

University

30 Qs

ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

Assessment

Quiz

Computers

University

Medium

Created by

Sebastian Zamorano

Used 35+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______?
Incident
Event
Attack
Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______?
Risk management
Incident detection
Malware
Disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________?
Exploit
Intrusion
Event
Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a privacy breach?
Unavailability of critical systems
Access of private information by an unauthorized person
Any observable occurrence in a network or system
Being exposed to the possibility of attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______?
Malware
Critical
Intrusion
Zero-day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of documentation exists for zero-day vulnerabilities?
CVSS
APT
CVE
None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Incident?
A potentially dangerous event
A new malware
Any event
A dangerous exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?