Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which relatively new type of attack is sophisticated, targeted, slow, and stealthy?

    1. Dumpster diving

    2. A worm infection of email servers

    3. Advanced persistent threat (APT)

    4. A virus infection distributed in a file system utility download

  2. Which of the following is used during forensic analysis to help establish a timeline of a computer crime?

    1. MAC times

    2. Chain of custody

    3. Codified laws

    4. Trans-border information flow

  3. Which of the following is an example of self-regulation?

    1. Sarbanes-Oxley (SOX)

    2. Gramm-Leach-Bliley ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.