ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

University

28 Qs

quiz-placeholder

Similar activities

Short Story Writing Quiz

Short Story Writing Quiz

University

25 Qs

Lesson 5 - CPU Scheduling

Lesson 5 - CPU Scheduling

University

25 Qs

CO2517

CO2517

University

25 Qs

Comp&Sec Essential: Operational Procedures Day 1

Comp&Sec Essential: Operational Procedures Day 1

University

27 Qs

UNIT 3 LO4 quiz

UNIT 3 LO4 quiz

4th Grade - University

30 Qs

data mining

data mining

University

30 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

Digital Forensics Ch1-2

Digital Forensics Ch1-2

University

33 Qs

ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

Assessment

Quiz

Computers

University

Medium

Created by

Sebastian Zamorano

Used 39+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______?
Incident
Event
Attack
Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______?
Risk management
Incident detection
Malware
Disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________?
Exploit
Intrusion
Event
Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a privacy breach?
Unavailability of critical systems
Access of private information by an unauthorized person
Any observable occurrence in a network or system
Being exposed to the possibility of attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______?
Malware
Critical
Intrusion
Zero-day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of documentation exists for zero-day vulnerabilities?
CVSS
APT
CVE
None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Incident?
A potentially dangerous event
A new malware
Any event
A dangerous exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?