Page 1277 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1277

that the vulnerability was not previously known. What type of
                    attack was this?

                    A.  Botnet


                    B.  Zero-day exploit

                    C.  Denial of service

                    D.  Distributed denial of service

                6.  Of the following choices, which is the most common method of
                    distributing malware?

                    A.  Drive-by downloads

                    B.  USB flash drives

                    C.  Ransomware

                    D.  Unapproved software

                7.  Of the following choices, what indicates the primary purpose of an

                    intrusion detection system (IDS)?

                    A.  Detect abnormal activity

                    B.  Diagnose system failures

                    C.  Rate system performance

                    D.  Test a system for vulnerabilities

                8.  Which of the following is true for a host-based intrusion detection
                    system (HIDS)?

                    A.  It monitors an entire network.

                    B.  It monitors a single system.


                    C.  It’s invisible to attackers and authorized users.

                    D.  It cannot detect malicious code.

                9.  Which of the following is a fake network designed to tempt
                    intruders with unpatched and unprotected security vulnerabilities
                    and false data?

                    A.  IDS
   1272   1273   1274   1275   1276   1277   1278   1279   1280   1281   1282