MISY 5325 Midterm Exam Questions
and Answers 100% PASS
_______ are acts that are hostile to an organization. - CORRECT ANSWER-
Intentional threats
________ help(s) prevent a hard drive from being a single point of failure.
__________ help(s) prevent a server from being a single point of failure.
_________ help(s) prevent a person from being a single point of failure. -
CORRECT ANSWER-RAID, Failover clusters, Cross-training
_________ is the process of creating a list of threats. - CORRECT ANSWER-
Threat identification
__________ damage for the sake of doing damage, and they often choose targets
of opportunity. - CORRECT ANSWER-Vandals
____________ assessments are objective, while ___________ assessments are
subjective. - CORRECT ANSWER-Quantitative, qualitative
_____________ is the likelihood that a threat will exploit a vulnerability. -
CORRECT ANSWER-Probability
A __________ is a computer joined to a botnet. - CORRECT ANSWER-zombie
,A ___________ plan can help ensure that mission-critical systems continue to
function after a disaster. - CORRECT ANSWER-business continuity
A ___________ plan can help you identify steps needed to restore a failed system.
- CORRECT ANSWER-disaster recovery
A _____________ policy governs how patches are understood, tested, and rolled
out to systems and clients. - CORRECT ANSWER-patch management
A business impact analysis (BIA) is an important part of a _____________, and it
can also be part of a __________. - CORRECT ANSWER-business continuity
plan, disaster recovery plan
A new company does not have a lot of revenue for the first year. Installing
antivirus software for all the company's computers would be very costly, so the
owners decide to forgo purchasing antivirus software for the first year of the
business. In what domain of a typical IT infrastructure is a vulnerability created? -
CORRECT ANSWER-Workstation Domain
A technician in a large corporation fixes a printer that was not receiving an IP
address automatically by manually assigning it an address. The address was
assigned to a server that was offline and being upgraded. When the server was
brought online, it was no longer accessible. How could this problem have been
avoided? - CORRECT ANSWER-Through change management
COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED
,A warm site is: - CORRECT ANSWER-a compromise between a hot site and a
cold site.
A_____ is a computer joined to a botnet - CORRECT ANSWER-zombie
A______policy governs how patches are understood ,tested ,and rolled out to
systems and clients. - CORRECT ANSWER-patch management
A(n) _________ is the likelihood that something unexpected is going to occur. -
CORRECT ANSWER-risk
A(n) _________ provides secure access to a private network over a public network
such as the Internet. - CORRECT ANSWER-virtual private network (VPN)
A(n) _____________ is a process used to determine how to manage risk. -
CORRECT ANSWER-cost-benefit analysis (CBA)
A(n) ___________________ is performed to identify and evaluate risks. -
CORRECT ANSWER-risk assessment
According to the World Intellectual Property Organization (WIPO), the two
categories of intellectual property (IP) are _______________ and
_______________. - CORRECT ANSWER-industrial property, copyright
Aditya is assessing the value of IT systems. His company sells sporting goods
online. One factor of his evaluation is the required availability of each system.
Some systems must be available 24/7, while others must be available during regular
business hours Monday through Friday. Which of the following would have the
, highest availability requirements? - CORRECT ANSWER-E-commerce website
server
Alice is an aspiring hacker. She wants to get information on computer and network
vulnerabilities and ways to exploit applications. Which of the following is the best
source? - CORRECT ANSWER-Dark web
All of following are examples of hardware assets, except: - CORRECT ANSWER-
operating system.
All of the following are reasons why configuration management is an important
risk management process, except: - CORRECT ANSWER-it reduces unintended
outages.
All of the following are true of risk assessment critical area identification, except: -
CORRECT ANSWER-when critical areas are identified, areas that are least critical
to the business should be the first priority.
All of the following are true of risk assessment scope identification, except: -
CORRECT ANSWER-the system or network administrator ultimately decides
what is included in the scope of a risk assessment.
All of the following terms have the same meaning, except: - CORRECT
ANSWER-Internal network zone
COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED
and Answers 100% PASS
_______ are acts that are hostile to an organization. - CORRECT ANSWER-
Intentional threats
________ help(s) prevent a hard drive from being a single point of failure.
__________ help(s) prevent a server from being a single point of failure.
_________ help(s) prevent a person from being a single point of failure. -
CORRECT ANSWER-RAID, Failover clusters, Cross-training
_________ is the process of creating a list of threats. - CORRECT ANSWER-
Threat identification
__________ damage for the sake of doing damage, and they often choose targets
of opportunity. - CORRECT ANSWER-Vandals
____________ assessments are objective, while ___________ assessments are
subjective. - CORRECT ANSWER-Quantitative, qualitative
_____________ is the likelihood that a threat will exploit a vulnerability. -
CORRECT ANSWER-Probability
A __________ is a computer joined to a botnet. - CORRECT ANSWER-zombie
,A ___________ plan can help ensure that mission-critical systems continue to
function after a disaster. - CORRECT ANSWER-business continuity
A ___________ plan can help you identify steps needed to restore a failed system.
- CORRECT ANSWER-disaster recovery
A _____________ policy governs how patches are understood, tested, and rolled
out to systems and clients. - CORRECT ANSWER-patch management
A business impact analysis (BIA) is an important part of a _____________, and it
can also be part of a __________. - CORRECT ANSWER-business continuity
plan, disaster recovery plan
A new company does not have a lot of revenue for the first year. Installing
antivirus software for all the company's computers would be very costly, so the
owners decide to forgo purchasing antivirus software for the first year of the
business. In what domain of a typical IT infrastructure is a vulnerability created? -
CORRECT ANSWER-Workstation Domain
A technician in a large corporation fixes a printer that was not receiving an IP
address automatically by manually assigning it an address. The address was
assigned to a server that was offline and being upgraded. When the server was
brought online, it was no longer accessible. How could this problem have been
avoided? - CORRECT ANSWER-Through change management
COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED
,A warm site is: - CORRECT ANSWER-a compromise between a hot site and a
cold site.
A_____ is a computer joined to a botnet - CORRECT ANSWER-zombie
A______policy governs how patches are understood ,tested ,and rolled out to
systems and clients. - CORRECT ANSWER-patch management
A(n) _________ is the likelihood that something unexpected is going to occur. -
CORRECT ANSWER-risk
A(n) _________ provides secure access to a private network over a public network
such as the Internet. - CORRECT ANSWER-virtual private network (VPN)
A(n) _____________ is a process used to determine how to manage risk. -
CORRECT ANSWER-cost-benefit analysis (CBA)
A(n) ___________________ is performed to identify and evaluate risks. -
CORRECT ANSWER-risk assessment
According to the World Intellectual Property Organization (WIPO), the two
categories of intellectual property (IP) are _______________ and
_______________. - CORRECT ANSWER-industrial property, copyright
Aditya is assessing the value of IT systems. His company sells sporting goods
online. One factor of his evaluation is the required availability of each system.
Some systems must be available 24/7, while others must be available during regular
business hours Monday through Friday. Which of the following would have the
, highest availability requirements? - CORRECT ANSWER-E-commerce website
server
Alice is an aspiring hacker. She wants to get information on computer and network
vulnerabilities and ways to exploit applications. Which of the following is the best
source? - CORRECT ANSWER-Dark web
All of following are examples of hardware assets, except: - CORRECT ANSWER-
operating system.
All of the following are reasons why configuration management is an important
risk management process, except: - CORRECT ANSWER-it reduces unintended
outages.
All of the following are true of risk assessment critical area identification, except: -
CORRECT ANSWER-when critical areas are identified, areas that are least critical
to the business should be the first priority.
All of the following are true of risk assessment scope identification, except: -
CORRECT ANSWER-the system or network administrator ultimately decides
what is included in the scope of a risk assessment.
All of the following terms have the same meaning, except: - CORRECT
ANSWER-Internal network zone
COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED