100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS 410 Exam 1 Questions and Answers Already Passed Latest Update

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
19-08-2025
Written in
2025/2026

CIS 410 Exam 1 Questions and Answers Already Passed Latest Update DoS - Answers Which type of attack involves sending a large number of connection or information requests to a target? Armed Robbery - Answers Force majeure includes all of the following EXCEPT: integrity - Answers Which of the following is a C.I.A. triad characteristic that addresses the threat from corruption, damage, destruction, or other disruption of its authentic state? ransomware - Answers An attack that uses phishing techniques along with specialized forms of malware to encrypt the victim's data files is known as __________ competitive intelligence - Answers Some information gathering techniques are quite legal—for example, using a Web browser to perform market research. These legal techniques are called, collectively, __________. Pracy - Answers Duplication of software-based intellectual property is more commonly known as software __________. Cracker - Answers A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n) __________. Authentication - Answers The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? Confidentiality - Answers Which of the following is a C.I.A. triad characteristic that ensures only those with sufficient privileges and a demonstrated need may access certain information? -Planning: developing, creating, and implementing controls to accomplish organization objectives. -Organizing: Structuring the use of resources to support how an organization accomplishes objectives -Leading: Encourages the organization to implement the planning and organizing functions. This includes supervising employee performance, behavior, and attitude while ensuring completion of the assigned objectives. -Controlling: ensures the validity of the organization's plan by making sure that sufficient progress is being made. - Answers List and explain the four principles of management under the contemporary or popular management theory. Briefly define each. Planning in information security involves activities necessary to support the design, creation, and implementation of information security practices. These plans must support information and technology assets of the entire organization. Information security planning includes different types such as incident response planning, business continuity planning, disaster recovery planning and more. - Answers Discuss the planning element of information security. Spam - Answers __________ is unsolicited commercial e-mail. Rainbow Table - Answers The hash values for a wide variety of passwords can be stored in a database known as a(n) __________, which can be indexed and quickly searched using the hash value, allowing the corresponding plaintext password to be determined. Threat - Answers Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) __________. Hactivism - Answers One form of online vandalism is __________, in which individuals interfere with or disrupt systems to protest the operations, policies, or actions of an organization or

Show more Read less
Institution
CIS 410
Course
CIS 410









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIS 410
Course
CIS 410

Document information

Uploaded on
August 19, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIS 410 Exam 1 Questions and Answers Already Passed Latest Update 2025-2026

DoS - Answers Which type of attack involves sending a large number of connection or
information requests to a target?

Armed Robbery - Answers Force majeure includes all of the following EXCEPT:

integrity - Answers Which of the following is a C.I.A. triad characteristic that addresses the
threat from corruption, damage, destruction, or other disruption of its authentic state?

ransomware - Answers An attack that uses phishing techniques along with specialized forms of
malware to encrypt the victim's data files is known as __________

competitive intelligence - Answers Some information gathering techniques are quite legal—for
example, using a Web browser to perform market research. These legal techniques are called,
collectively, __________.

Pracy - Answers Duplication of software-based intellectual property is more commonly known
as software __________.

Cracker - Answers A hacker who intentionally removes or bypasses software copyright
protection designed to prevent unauthorized duplication or use is known as a(n) __________.

Authentication - Answers The use of cryptographic certificates to establish Secure Sockets
Layer (SSL) connections is an example of which process?

Confidentiality - Answers Which of the following is a C.I.A. triad characteristic that ensures only
those with sufficient privileges and a demonstrated need may access certain information?

-Planning: developing, creating, and implementing controls to accomplish organization
objectives.

-Organizing: Structuring the use of resources to support how an organization accomplishes
objectives

-Leading: Encourages the organization to implement the planning and organizing functions. This
includes supervising employee performance, behavior, and attitude while ensuring completion
of the assigned objectives.

-Controlling: ensures the validity of the organization's plan by making sure that sufficient
progress is being made. - Answers List and explain the four principles of management under the
contemporary or popular management theory. Briefly define each.

Planning in information security involves activities necessary to support the design, creation,
and implementation of information security practices. These plans must support information
and technology assets of the entire organization. Information security planning includes
different types such as incident response planning, business continuity planning, disaster

, recovery planning and more. - Answers Discuss the planning element of information security.

Spam - Answers __________ is unsolicited commercial e-mail.

Rainbow Table - Answers The hash values for a wide variety of passwords can be stored in a
database known as a(n) __________, which can be indexed and quickly searched using the hash
value, allowing the corresponding plaintext password to be determined.

Threat - Answers Any event or circumstance that has the potential to adversely affect
operations and assets is known as a(n) __________.

Hactivism - Answers One form of online vandalism is __________, in which individuals interfere
with or disrupt systems to protest the operations, policies, or actions of an organization or
government agency.

Confidentiality:



Integrity



Availability



(explain as well) - Answers List and explain the critical characteristics of information as defined
by the C.I.A. triad.

Technical Controls - Answers Human error or failure often can be prevented with training and
awareness programs, policy, and __________.

People - Answers Which function of InfoSec management encompasses security personnel as
well as aspects of the SETA program?

Extortion Sins - Answers Which of the following is not among the "deadly sins of software
security"?

Organization - Answers Which of the following is the principle of management dedicated to the
structuring of resources to support the accomplishment of objectives?

Cultural Mores - Answers Ethics are based on ___________________, which are the relatively fixed
moral attitudes or customs of a societal group.

Restitution - Answers Which of the following is compensation for a wrong committed by an
individual or organization?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
32
Member since
7 months
Number of followers
1
Documents
10467
Last sold
1 day ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions