ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

University

28 Qs

quiz-placeholder

Similar activities

Malware Types and Prevention Quiz

Malware Types and Prevention Quiz

University

25 Qs

Computer Incident Response Quiz

Computer Incident Response Quiz

University

25 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

COMP1219 - Customer Service Skills

COMP1219 - Customer Service Skills

University

23 Qs

Final Examination IAS 323

Final Examination IAS 323

University

24 Qs

unit-3 mcqs

unit-3 mcqs

University

25 Qs

Graph Data Structure - 01

Graph Data Structure - 01

University

26 Qs

Web Systems and Tech Quiz 1

Web Systems and Tech Quiz 1

University

25 Qs

ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

Assessment

Quiz

Computers

University

Medium

Created by

Sebastian Zamorano

Used 43+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______?
Incident
Event
Attack
Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______?
Risk management
Incident detection
Malware
Disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________?
Exploit
Intrusion
Event
Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a privacy breach?
Unavailability of critical systems
Access of private information by an unauthorized person
Any observable occurrence in a network or system
Being exposed to the possibility of attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______?
Malware
Critical
Intrusion
Zero-day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of documentation exists for zero-day vulnerabilities?
CVSS
APT
CVE
None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Incident?
A potentially dangerous event
A new malware
Any event
A dangerous exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?