
ISC2 - CC - Chapter 2 - Module 1
Authored by Sebastian Zamorano
Computers
University
Used 45+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______?
Incident
Event
Attack
Threat
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______?
Risk management
Incident detection
Malware
Disaster
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________?
Exploit
Intrusion
Event
Malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is an example of a privacy breach?
Unavailability of critical systems
Access of private information by an unauthorized person
Any observable occurrence in a network or system
Being exposed to the possibility of attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______?
Malware
Critical
Intrusion
Zero-day
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of documentation exists for zero-day vulnerabilities?
CVSS
APT
CVE
None
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an Incident?
A potentially dangerous event
A new malware
Any event
A dangerous exploit
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?