A. Any attack specifically listed in your security policy
B. Any illegal attack that compromises a protected computer
C. Any violation of a law or regulation that involves a computer
D. Failure to practice due diligence in computer security
A. To attack the availability of military systems
B. To obtain secret and restricted information from military or law enforcement sources
C. To utilize military or intelligence agency systems to attack other nonmilitary sites
D. To compromise military systems for use in attacks against other systems
A. Business attack
B. Denial-of-service attack
C. Financial attack
D. Military and intelligence attack
A. Access services you have not purchased
B. Disclose confidential personal employee information
C. Transfer funds from an unapproved source into your account
D. Steal money from another organization
A. Altering sensitive trade secret documents
B. Damaging the ability to communicate and respond to a physical attack
C. Stealing unclassified information
D. Transferring funds to other countries
A. Disclosing embarrassing personal information
B. Launching a virus on an organization’s system
C. Sending inappropriate email with a spoofed origination address of the victim organization
D. Using automated tools to scan the organization’s systems for vulnerable ports
A. Bragging rights
B. Money from the sale of stolen documents
C. Pride of conquering a secure system
D. Retaliation against a person or organization
A. Do not turn off a computer until you photograph the screen.
B. List all people present while collecting evidence.
C. Never modify evidence during the collection process.
D. Transfer all equipment to a secure storage location.
A. All of the damage has been done. Turning the machine off would not stop additional damage.
B. There is no other system that can replace this one if it is turned off.
C. Too many users are logged in and using the system.
D. Valuable evidence in memory will be lost.
A. Financial gain
B. Thrill
C. Skill
D. Political beliefs
A. Any active attack that causes damage to your system
B. Any violation of a code of ethics
C. Any crime (or violation of a law or regulation) that involves a computer
D. Any event that adversely affects the confidentiality, integrity, or availability of your data
A. All port scans indicate adversarial behavior.
B. Port scans can precede attacks that cause damage and can indicate a future attack.
C. Scanning a port damages the port.
D. Port scanning uses system resources that could be put to better uses.
A. Compromise
B. Denial of service
C. Malicious code
D. Scanning
A. Be aware of the newest attacks.
B. Configure your IDS to detect and report all abnormal traffic.
C. Know what your normal system activity looks like.
D. Study the activity signatures of the main types of attacks.
A. Consent agreement signed by employees
B. Search warrant
C. No legal avenue is necessary.
D. Voluntary consent
A. An incident may not be discovered for several days and valuable evidence could be lost.
B. Disk space is cheap, and log files are used frequently.
C. Log files are protected and cannot be altered.
D. Any information in a log file is useless after it is several hours old.
A. Confidential information protected by government regulation was possibly disclosed.
B. Damages exceeded $1,500.
C. The incident has occurred before.
D. The incident resulted in a violation of a law