100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIT 425 EXAM Questions AND Correct Answers

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
08-10-2025
Written in
2025/2026

CMIT 425 EXAM Questions AND Correct Answers

Institution
CMIT 425
Course
CMIT 425









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CMIT 425
Course
CMIT 425

Document information

Uploaded on
October 8, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CMIT 425 EXAM Questions AND Correct Answers
_______ is a series of international standards that, among other things, provides
guidance for managing security controls. - ✔✔ISO/IEC 27000


________ is a legal obligation applied to executives which stockholders can use
to sue company leaders who fail to protect a company's assets from harm or
loss. - ✔✔Due notice
Due diligence
Due performance


________ is a legal principle that requires that individuals perform necessary
actions to prevent negligence from occurring. It is judged using the reasonable
person standard. - ✔✔Due care
Customary law
Separation of duties


A ______ is a document which defines mandatory activities, actions, or rules. -
✔✔Standard


A ___________ is a potential danger which occurs when a ___________ exploits
a vulnerability. - ✔✔threat, threat agent


A company needs to conduct a Business Impact Assessment (BIA) in order to
identify important business processes and assets which could be impacted by a
cyber attack, natural disaster or any other event with potential to cause an
extended interruption in its operations. Which of the following groups are most
likely to provide critical information for the team conducting the BIA? -
✔✔National Hurricane Center.

, Business process owners.


Employees, Managers, and Supervisors.


A control is _____________ - ✔✔used to reduce or mitigate risks.


A risk is __________ - ✔✔the probability that a vulnerability will be successfully
exploited by a threat agent causing a business to experience loss or harm.


A weakness in a system that allows malware to compromise security is called a
_________. - ✔✔vulnerability


An exposure occurs when a vulnerability _____________. - ✔✔creates the
possibility of incurring a loss or experiencing harm.


Availability is the principle which ensures ____________. - ✔✔reliability and
timely access to data and other resources by authorized individuals.


Balanced security refers to _____________ - ✔✔weighing choices in controls
against the magnitude of risk presented by a variety of threats.


addressing threats and implementing controls for availability, integrity, and
confidentiality.


understanding the concepts of the AIC triad.
$12.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ExamsCentre
4.0
(2)

Get to know the seller

Seller avatar
ExamsCentre New Yo
View profile
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
9 months
Number of followers
0
Documents
1711
Last sold
1 week ago

4.0

2 reviews

5
1
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions