2025/2026 Complete Questions And Correct
Detailed Answers (Verified Answers) |Brand New
Version!!
Save
Terms in this set (234)
_______ are acts that are Intentional threats
hostile to an organization.
________ help(s) prevent a RAID, Failover clusters, Cross-training
hard drive from being a
single point of failure.
__________ help(s) prevent a
server from being a single
point of failure. _________
help(s) prevent a person
from being a single point
of failure.
_________ is the process of Threat identification
creating a list of threats.
__________ damage for the Vandals
sake of doing damage,
and they often choose
targets of opportunity.
,____________ assessments are Quantitative, qualitative
objective, while ___________
assessments are
subjective.
_____________ is the likelihood Probability
that a threat will exploit a
vulnerability.
A __________ is a computer zombie
joined to a botnet.
A ___________ plan can help business continuity
ensure that mission-critical
systems continue to
function after a disaster.
A ___________ plan can help disaster recovery
you identify steps needed
to restore a failed system.
A _____________ policy governs patch management
how patches are
understood, tested, and
rolled out to systems and
clients.
A business impact analysis business continuity plan, disaster recovery plan
(BIA) is an important part
of a _____________, and it can
also be part of a __________.
, A new company does not Workstation Domain
have a lot of revenue for
the first year. Installing
antivirus software for all
the company's computers
would be very costly, so
the owners decide to
forgo purchasing antivirus
software for the first year
of the business. In what
domain of a typical IT
infrastructure is a
vulnerability created?
A technician in a large Through change management
corporation fixes a printer
that was not receiving an
IP address automatically
by manually assigning it an
address. The address was
assigned to a server that
was offline and being
upgraded. When the
server was brought online,
it was no longer
accessible. How could this
problem have been
avoided?
A warm site is: a compromise between a hot site and a cold site.
A_____ is a computer joined zombie
to a botnet
A______policy governs how patch management
patches are understood
,tested ,and rolled out to
systems and clients.