True
False
True
False
Intrusion Delay System
Incident Discovery System
Information Destruction System
Intrusion detection system
True
False
True
False
Telnet / rlogin / rsh
Ftp / anonymous ftp / tftp
P2P
IRC and instant messaging
All of the above
True
False
Control of the information, information systems, facilities, and flow of information
Publicity
Risk of continued hacking or malware activities
Risk of equipment seizure and/or interruption to business during an investigation
Legal protections that apply to alleged perpetrator regarding unreasonable search (e.g., if a Company employee should become “an agent acting on behalf of law enforcement”).
All of the above
Major network zones and primary services
Workstations
Wireless network connection points
Remote network connection points
A, C, and D
B, C, and D
A, B, and C
Workstations and Users
Remote Access
Networks: LAN, LAN-to-WAN, and WAN
Systems/Applications