100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

MIS 200 Final Exam Questions with Correct Answers 100% Verified By Experts

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
15-01-2026
Written in
2025/2026

MIS 200 Final Exam Questions with Correct Answers 100% Verified By Experts

Institution
MIS 200
Course
MIS 200









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MIS 200
Course
MIS 200

Document information

Uploaded on
January 15, 2026
Number of pages
13
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIS 200 Final Exam Questions with Correct Answers 100% Verified By Experts| Latest Update
Guaranteed Success

What is a cybersecurity threat? An event or condition that has the potential for causing
asset loss and the undesirable consequences or impact from such loss.



What types of assets are included in cybersecurity? Information, software, and hardware.



What are cybersecurity vulnerabilities? Weaknesses or flaws in system security procedures,
design, implementation, and control that could be compromised accidentally or intentionally.



What can result from cybersecurity vulnerabilities? 1. Security breaches
2. loss of information or data
3. system outages
4. violations of an organization's
5. system security policy


Why do governmental and corporate organizations maintain databases of software
vulnerabilities? To help prevent against known vulnerabilities by providing accessible
information organized by software version.



Social Engineering The manipulation of people to give up their confidential information,
such as bank information, passwords, and social security numbers.



What are the three common cybersecurity goals? 1. Protection of data, information, and
systems
2. Preservation of data, information, and system integrity
3. Promotion of authentication of data, systems, and information.

, Maintaining integrity in cybersecurity Through user-access controls, file permissions, and
version control of system and data files.



Authentication in cybersecurity A process that helps establish the origin of information or
confirm an individual's or entity's identity. Prevents unauthorized access



DDoS Attack Distributed Denial of Service is an external attack that makes computers or
online services unavailable to users. Done by flooding the resource with a ton of requests.



Malware External cyberattack - Any malicious software installed on a client or server
designed to harm, steal, or mess up systems


Features: ransomware, rootkit, zero-day exploit, virus, spyware, adware



Ransomware External cyberattack - Makes computer data inaccessible until a ransom is
paid. Often targets orgs that can't afford systems to be down such as hospitals. Usually done in
payments that are hard to trace such as Bitcoin



Rootkit External cyberattack - hides in the operating system (os) and is triggered each time
you boot the computer.


Allows another user to gain control over another system while undetected. Can install rouge
programs and delete files.



Zero-day exploit External cyberattack that targets software flaws that the developer doesn't
know about yet, so the attack hits before anyone can patch it



Virus External cyberattack that can either destroy programs or alter the operations of a
computer or network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MindRift Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
5 months
Number of followers
0
Documents
7615
Last sold
2 weeks ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions