ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Azure Cloud computing

Azure Cloud computing

Professional Development

10 Qs

Teaching Strategy

Teaching Strategy

Professional Development

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

GRAND OPENING INTERNSHIP EXERCISE 2024

GRAND OPENING INTERNSHIP EXERCISE 2024

Professional Development

13 Qs

C String Array MCQs

C String Array MCQs

Professional Development

10 Qs

เทคโนโลยี (วิทยาการคำนวณ) ชั้นมัธยมศึกษาปีที่ 5

เทคโนโลยี (วิทยาการคำนวณ) ชั้นมัธยมศึกษาปีที่ 5

Professional Development

20 Qs

Data Analytics Basics

Data Analytics Basics

Professional Development

10 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Sebastian Zamorano

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SIEM mean?

System Information and Event Manager

System Information and Enterprise Manager

Security Information and Event Manager

Security Information and Enterprise Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack embeds malicious payload inside a reputable or trusted software?

Trojans

Phishing

Rootkits

DDOS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack has the PRIMARY objective controlling the system from outside?

Trojans

DDOS

Rootkits

Backdoors

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which devices would be more effective in detecting an intrusion into a network?

Firewalls

HIDS

NIDS

Anti-malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to gain information by observing the device's power consumption?

Trojans

Side channels

DOS

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack will most effectively maintain remote access and control over the victim's computer?

Rootkits

Trojans

Phishing

Cross-Site Scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?

DDOS

Trojan

Phishing

Side channel

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?