O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which relatively new type of attack is sophisticated, targeted, slow, and stealthy?

    1. Dumpster diving

    2. A worm infection of email servers

    3. Advanced persistent threat (APT)

    4. A virus infection distributed in a file system utility download

  2. Which of the following is used during forensic analysis to help establish a timeline of a computer crime?

    1. MAC times

    2. Chain of custody

    3. Codified laws

    4. Trans-border information flow

  3. Which of the following is an example of self-regulation?

    1. Sarbanes-Oxley (SOX)

    2. Gramm-Leach-Bliley ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required