Chapter review
Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.
Which relatively new type of attack is sophisticated, targeted, slow, and stealthy?
Dumpster diving
A worm infection of email servers
Advanced persistent threat (APT)
A virus infection distributed in a file system utility download
Which of the following is used during forensic analysis to help establish a timeline of a computer crime?
MAC times
Chain of custody
Codified laws
Trans-border information flow
Which of the following is an example of self-regulation?
Sarbanes-Oxley (SOX)
Gramm-Leach-Bliley ...
Get CISSP Training Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.