Page 1382 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1382
attack?
A. Altering sensitive trade secret documents
B. Damaging the ability to communicate and respond to a physical
attack
C. Stealing unclassified information
D. Transferring funds to other countries
6. Which of the following would not be a primary goal of a grudge
attack?
A. Disclosing embarrassing personal information
B. Launching a virus on an organization’s system
C. Sending inappropriate email with a spoofed origination address
of the victim organization
D. Using automated tools to scan the organization’s systems for
vulnerable ports
7. What are the primary reasons attackers engage in thrill attacks?
(Choose all that apply.)
A. Bragging rights
B. Money from the sale of stolen documents
C. Pride of conquering a secure system
D. Retaliation against a person or organization
8. What is the most important rule to follow when collecting
evidence?
A. Do not turn off a computer until you photograph the screen.
B. List all people present while collecting evidence.
C. Never modify evidence during the collection process.
D. Transfer all equipment to a secure storage location.
9. What would be a valid argument for not immediately removing
power from a machine when an incident is discovered?

