100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

MIS 320 WWU EXAM 2 ACTUAL 2026 QUESTIONS SOLUTIONS GRADED A+

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
16-01-2026
Written in
2025/2026

MIS 320 WWU EXAM 2 ACTUAL 2026 QUESTIONS SOLUTIONS GRADED A+

Institution
MIS
Course
MIS










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MIS
Course
MIS

Document information

Uploaded on
January 16, 2026
Number of pages
24
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIS 320 WWU EXAM 2 ACTUAL 2026
QUESTIONS SOLUTIONS GRADED A+

◉ The criminal organization has decided to leave their traditional
ways and pursue cyber attacks as their new mode of operation. Why
would they do this? Answer: Easier to hide their attacks


◉ Which of the following best describes what Della could do to
prevent unauthorized parties from viewing sensitive customer
information at her retail store? Answer: Use software to encrypt
data in a secure database


◉ Duante needs to research the behavior of attackers as well as how
they coordinate their attacks. Where is Duante most likely to look for
this type of information Answer: TTP database


◉ What is a TTP database? Answer: The adversary tactics,
techniques, and procedures (TTP) is a database of the behavior of
threat actors and how they orchestrate and manage attacks


◉ What are some of the challenges an organization may face when
trying to be in regulatory compliance as a relates to information
security? Answer: Virtually every industry has its own set of
regulations, a requirement in one regulation may negate one
another, no two states share the same side of regulations

,(Answer is all of the above)


◉ A visitor is trying to access a military base. The visitor needs to
supply their license and enter other personal information via a
kiosk. The visitor is eventually allowed to enter the base but is
limited to certain areas only. What security principles are being
employed? Select two. Answer: Authentication and authorization


◉ What is authentication? Answer: Verifying that a user is who they
claim to be


◉ What is authorization? Answer: Used to grant a user permission
to enter because their credentials are authentic


◉ A friend gets a virus and asks if you can help them fix the problem.
You both the computer with the bootable flash drive containing
security related tools and remove the virus. What type of control did
you employ? Answer: Corrective


◉ An entity is determined and decides to commit to a multi year
intrusion campaign with the goal of obtaining national security
information. Which of the following describes the type of attack the
entity is most likely to engage in? Select two. Answer: Data
exfiltration and APT

, ◉ What is APT? Answer: Is advanced persistent threats, or a new
class of attacks where innovative tools are used to infect the system
and then it's certainly extract data over an extended period of time


◉ Which of the following best describes the possible impact of an
attack where credit card data is stolen from a company and the
breach is eventually reported in the news? Select two. Answer: Loss
of reputation and possible prison time for the IT personnel


◉ Company A wants to be first to market with the product
forecasted to be very profitable. A few bad actors and Company A
launch an attack against company B to steal intellectual property
that will help them. What type of threat actor would do something
like this? Answer: Competitors


◉ What do competitors do? Answer: Launch attacks against an
opponent's system to steal classified information as well as new
product research


◉ Which of the following most accurately describes the similarities
and or differences between spear phishing and whaling? select two
Answer: Spear phishing uses customized information to target
specific users. Whaling targets wealthy individuals and senior
executives in a business
$13.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
GradeGalaxy

Get to know the seller

Seller avatar
GradeGalaxy Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
2 months
Number of followers
0
Documents
7384
Last sold
3 days ago
GradeGalaxy

Welcome to the premier destination for high-quality academic support. GradeGalaxy7 provides a comprehensive suite of educational materials, including expertly sourced test banks, solution manuals, and study guides. Our resources are meticulously organized to streamline your revision process and enhance your understanding of core concepts. Equip yourself with the reliable content you need to achieve superior academic results.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions