APPENDIX AComprehensive Questions
Use the following scenario to answer Questions 1–3. Josh has discovered that an organized hacking ring in China has been targeting his company’s research and development department. If these hackers have been able to uncover his company’s research finding, this means they probably have access to his company’s intellectual property. Josh thinks that an e-mail server in their DMZ may have been successfully compromised and a rootkit loaded.
1. Based upon this scenario, what is most likely the biggest risk Josh’s company needs to be concerned with?
A. Market share drop if the attackers are able to bring the specific product to market more quickly than Josh’s company.
B. Confidentiality of e-mail messages. Attackers ...