Page 1277 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1277
that the vulnerability was not previously known. What type of
attack was this?
A. Botnet
B. Zero-day exploit
C. Denial of service
D. Distributed denial of service
6. Of the following choices, which is the most common method of
distributing malware?
A. Drive-by downloads
B. USB flash drives
C. Ransomware
D. Unapproved software
7. Of the following choices, what indicates the primary purpose of an
intrusion detection system (IDS)?
A. Detect abnormal activity
B. Diagnose system failures
C. Rate system performance
D. Test a system for vulnerabilities
8. Which of the following is true for a host-based intrusion detection
system (HIDS)?
A. It monitors an entire network.
B. It monitors a single system.
C. It’s invisible to attackers and authorized users.
D. It cannot detect malicious code.
9. Which of the following is a fake network designed to tempt
intruders with unpatched and unprotected security vulnerabilities
and false data?
A. IDS

