Page 1382 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1382

attack?

                    A.  Altering sensitive trade secret documents


                    B.  Damaging the ability to communicate and respond to a physical
                        attack

                    C.  Stealing unclassified information

                    D.  Transferring funds to other countries

                6.  Which of the following would not be a primary goal of a grudge
                    attack?

                    A.  Disclosing embarrassing personal information

                    B.  Launching a virus on an organization’s system

                    C.  Sending inappropriate email with a spoofed origination address
                        of the victim organization


                    D.  Using automated tools to scan the organization’s systems for
                        vulnerable ports

                7.  What are the primary reasons attackers engage in thrill attacks?
                    (Choose all that apply.)

                    A.  Bragging rights

                    B.  Money from the sale of stolen documents

                    C.  Pride of conquering a secure system

                    D.  Retaliation against a person or organization

                8.  What is the most important rule to follow when collecting

                    evidence?

                    A.  Do not turn off a computer until you photograph the screen.

                    B.  List all people present while collecting evidence.

                    C.  Never modify evidence during the collection process.

                    D.  Transfer all equipment to a secure storage location.

                9.  What would be a valid argument for not immediately removing
                    power from a machine when an incident is discovered?
   1377   1378   1379   1380   1381   1382   1383   1384   1385   1386   1387