100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

MISY 5325 Midterm Exam Questions and Answers 100% PASS

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
02-01-2026
Written in
2025/2026

MISY 5325 Midterm Exam Questions and Answers 100% PASS

Institution
MISY
Module
MISY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MISY
Module
MISY

Document information

Uploaded on
January 2, 2026
Number of pages
31
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MISY 5325 Midterm Exam Questions
and Answers 100% PASS

_______ are acts that are hostile to an organization. - CORRECT ANSWER-

Intentional threats

________ help(s) prevent a hard drive from being a single point of failure.

__________ help(s) prevent a server from being a single point of failure.

_________ help(s) prevent a person from being a single point of failure. -

CORRECT ANSWER-RAID, Failover clusters, Cross-training

_________ is the process of creating a list of threats. - CORRECT ANSWER-

Threat identification

__________ damage for the sake of doing damage, and they often choose targets

of opportunity. - CORRECT ANSWER-Vandals

____________ assessments are objective, while ___________ assessments are

subjective. - CORRECT ANSWER-Quantitative, qualitative

_____________ is the likelihood that a threat will exploit a vulnerability. -

CORRECT ANSWER-Probability

A __________ is a computer joined to a botnet. - CORRECT ANSWER-zombie

,A ___________ plan can help ensure that mission-critical systems continue to

function after a disaster. - CORRECT ANSWER-business continuity

A ___________ plan can help you identify steps needed to restore a failed system.

- CORRECT ANSWER-disaster recovery

A _____________ policy governs how patches are understood, tested, and rolled

out to systems and clients. - CORRECT ANSWER-patch management

A business impact analysis (BIA) is an important part of a _____________, and it

can also be part of a __________. - CORRECT ANSWER-business continuity

plan, disaster recovery plan

A new company does not have a lot of revenue for the first year. Installing

antivirus software for all the company's computers would be very costly, so the

owners decide to forgo purchasing antivirus software for the first year of the

business. In what domain of a typical IT infrastructure is a vulnerability created? -

CORRECT ANSWER-Workstation Domain

A technician in a large corporation fixes a printer that was not receiving an IP

address automatically by manually assigning it an address. The address was

assigned to a server that was offline and being upgraded. When the server was

brought online, it was no longer accessible. How could this problem have been

avoided? - CORRECT ANSWER-Through change management




COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED

,A warm site is: - CORRECT ANSWER-a compromise between a hot site and a

cold site.

A_____ is a computer joined to a botnet - CORRECT ANSWER-zombie

A______policy governs how patches are understood ,tested ,and rolled out to

systems and clients. - CORRECT ANSWER-patch management

A(n) _________ is the likelihood that something unexpected is going to occur. -

CORRECT ANSWER-risk

A(n) _________ provides secure access to a private network over a public network

such as the Internet. - CORRECT ANSWER-virtual private network (VPN)

A(n) _____________ is a process used to determine how to manage risk. -

CORRECT ANSWER-cost-benefit analysis (CBA)

A(n) ___________________ is performed to identify and evaluate risks. -

CORRECT ANSWER-risk assessment

According to the World Intellectual Property Organization (WIPO), the two

categories of intellectual property (IP) are _______________ and

_______________. - CORRECT ANSWER-industrial property, copyright

Aditya is assessing the value of IT systems. His company sells sporting goods

online. One factor of his evaluation is the required availability of each system.

Some systems must be available 24/7, while others must be available during regular

business hours Monday through Friday. Which of the following would have the

, highest availability requirements? - CORRECT ANSWER-E-commerce website

server

Alice is an aspiring hacker. She wants to get information on computer and network

vulnerabilities and ways to exploit applications. Which of the following is the best

source? - CORRECT ANSWER-Dark web

All of following are examples of hardware assets, except: - CORRECT ANSWER-

operating system.

All of the following are reasons why configuration management is an important

risk management process, except: - CORRECT ANSWER-it reduces unintended

outages.

All of the following are true of risk assessment critical area identification, except: -

CORRECT ANSWER-when critical areas are identified, areas that are least critical

to the business should be the first priority.

All of the following are true of risk assessment scope identification, except: -

CORRECT ANSWER-the system or network administrator ultimately decides

what is included in the scope of a risk assessment.

All of the following terms have the same meaning, except: - CORRECT

ANSWER-Internal network zone




COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SophiaBennett Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
132
Member since
1 year
Number of followers
5
Documents
9104
Last sold
1 week ago
EXAM GAME-CHANGER

Exam Questions and Answers Section : Study Like a Pro, Study Smart, Study with Sophia.

3.7

26 reviews

5
10
4
5
3
7
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions