Page 1381 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1381

Review Questions



                1.  What is a computer crime?

                    A.  Any attack specifically listed in your security policy

                    B.  Any illegal attack that compromises a protected computer

                    C.  Any violation of a law or regulation that involves a computer

                    D.  Failure to practice due diligence in computer security

                2.  What is the main purpose of a military and intelligence attack?

                    A.  To attack the availability of military systems

                    B.  To obtain secret and restricted information from military or law

                        enforcement sources

                    C.  To utilize military or intelligence agency systems to attack other
                        nonmilitary sites

                    D.  To compromise military systems for use in attacks against other
                        systems

                3.  What type of attack targets proprietary information stored on a
                    civilian organization’s system?

                    A.  Business attack

                    B.  Denial-of-service attack


                    C.  Financial attack

                    D.  Military and intelligence attack

                4.  What goal is not a purpose of a financial attack?

                    A.  Access services you have not purchased

                    B.  Disclose confidential personal employee information

                    C.  Transfer funds from an unapproved source into your account

                    D.  Steal money from another organization

                5.  Which one of the following attacks is most indicative of a terrorist
   1376   1377   1378   1379   1380   1381   1382   1383   1384   1385   1386