Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.
Which relatively new type of attack is sophisticated, targeted, slow, and stealthy?
A worm infection of email servers
Advanced persistent threat (APT)
A virus infection distributed in a file system utility download
Which of the following is used during forensic analysis to help establish a timeline of a computer crime?
Chain of custody
Trans-border information flow
Which of the following is an example of self-regulation?