Chapter 11 ■ Practice Test 3 267
C. Data processor
D. Mission owner
- Tom believes that a customer of his Internet service provider has been exploiting a vulner-
ability in his system to read the email messages of other customers. If true, what law did
the customer most likely violate?
A. ECPA
B. CALEA
C. HITECH
D. Privacy Act - In the ring protection model shown here, what ring contains user programs and
applications?
Ring 3
Ring 2
Ring 1
Ring 0
A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3
- Metrics like the attack vector, complexity, exploit maturity, and how much user interac-
tion is required are all found in what scoring system?
A. CVE
B. CVSS
C. CNA
D. NVD