Misy 5325 Final Actual Exam Newest
2025/2026 Complete Questions And Correct
Detailed Answers (Verified Answers) |Brand
New Version!!
Procedures, policies - SOLUTION=__________ provide the detailed
steps needed to carry out ___________.
The security posture of an organization determines the custom settings
for access controls - SOLUTION=False
The three primary authorization models include all EXCEPT: -
SOLUTION=Multilayer authorization
The widespread adoption of virtualization as a preventative control is a
bad example of how technological innovation can influence business
continuity planning - SOLUTION=False
The work product of cybersecurity requirements management using the
NIST Cybersecurity Framework is referred to as a(n) __ -
SOLUTION=Profile
There are three categories of identification factors that include all BUT: -
SOLUTION=Role (something the user does)
,2|Page
Using specially crafted phone calls during a corporate account takeover,
criminals capture a business's online banking credentials or compromise
the workstation used for online banking. This is a form of Malware. -
SOLUTION=False
right, permission - SOLUTION=A __________ grants the authority to
perform an action on a system. A __________ grants access to a
resource.
security plan - SOLUTION=A business continuity plan (BCP) is an
example of a(n):
a packet analyzer - SOLUTION=A hacker wants to launch an attack on
an organization. The hacker uses a tool to capture data sent over the
network in cleartext, hoping to gather information that will help make
the attack successful. What tool is the hacker using?
assessments - SOLUTION=A threat is any activity that represents a
possible danger, which includes any circumstances or events with the
potential to cause an adverse impact on all of the following, except:
exploit - SOLUTION=A(n) ____________ assessment attempts to
identify vulnerabilities that can be exploited.
,3|Page
Social engineering - SOLUTION=An access control such as a firewall
or intrusion prevention system cannot protect against which of the
following?
input validation - SOLUTION=Another term for data range and
reasonableness checks is:
procedural controls. - SOLUTION=Background checks, software
testing, and awareness training are all categories of:
Public key infrastructure (PKI) - SOLUTION=Bill is a security
professional. He is in a meeting with co-workers and describes a system
that will make web sessions more secure. He says when a user connects
to the web server and starts a secure session, the server sends a
certificate to the user. The certificate includes a public key. The user can
encrypt data with the public key and send it to the server. Because the
server holds the private key, it can decrypt the data. Because no other
entity has the private key, no one else can decrypt the data. What is Bill
describing?
Insurance - SOLUTION=Bonding is a type of __________ that covers
against losses by theft, fraud, or dishonesty.
Vulnerability × Threat . - SOLUTION=Complete the equation for the
relationship between risk, vulnerabilities, and threats: Risk equals:
, 4|Page
Software Development - SOLUTION=Functionality testing is primarily
used with:
Before writing an application or deploying a system -
SOLUTION=Ideally, when should you perform threat modeling?
read sections of a database or a whole database without authorization. -
SOLUTION=In a SQL injection attack, an attacker can:
Tailgating - SOLUTION=Piggybacking is also known as:
Weather Conditions; Natural Disasters - SOLUTION=Primary
considerations for assessing threats based on historical data in your local
area are __________ and ___________.
share, transfer - SOLUTION=Purchasing insurance is the primary way
for an organization to __________ or ___________ risk.
Preventative, detective, corrective - SOLUTION=Some controls are
identified based on the function they perform. What are the broad classes
of controls based on function?
technical - SOLUTION=System logs and audit trails are a type of
________ control.