MIS 200 Final Exam Questions with Correct Answers 100% Verified By Experts| Latest Update
Guaranteed Success
What is a cybersecurity threat? An event or condition that has the potential for causing
asset loss and the undesirable consequences or impact from such loss.
What types of assets are included in cybersecurity? Information, software, and hardware.
What are cybersecurity vulnerabilities? Weaknesses or flaws in system security procedures,
design, implementation, and control that could be compromised accidentally or intentionally.
What can result from cybersecurity vulnerabilities? 1. Security breaches
2. loss of information or data
3. system outages
4. violations of an organization's
5. system security policy
Why do governmental and corporate organizations maintain databases of software
vulnerabilities? To help prevent against known vulnerabilities by providing accessible
information organized by software version.
Social Engineering The manipulation of people to give up their confidential information,
such as bank information, passwords, and social security numbers.
What are the three common cybersecurity goals? 1. Protection of data, information, and
systems
2. Preservation of data, information, and system integrity
3. Promotion of authentication of data, systems, and information.
, Maintaining integrity in cybersecurity Through user-access controls, file permissions, and
version control of system and data files.
Authentication in cybersecurity A process that helps establish the origin of information or
confirm an individual's or entity's identity. Prevents unauthorized access
DDoS Attack Distributed Denial of Service is an external attack that makes computers or
online services unavailable to users. Done by flooding the resource with a ton of requests.
Malware External cyberattack - Any malicious software installed on a client or server
designed to harm, steal, or mess up systems
Features: ransomware, rootkit, zero-day exploit, virus, spyware, adware
Ransomware External cyberattack - Makes computer data inaccessible until a ransom is
paid. Often targets orgs that can't afford systems to be down such as hospitals. Usually done in
payments that are hard to trace such as Bitcoin
Rootkit External cyberattack - hides in the operating system (os) and is triggered each time
you boot the computer.
Allows another user to gain control over another system while undetected. Can install rouge
programs and delete files.
Zero-day exploit External cyberattack that targets software flaws that the developer doesn't
know about yet, so the attack hits before anyone can patch it
Virus External cyberattack that can either destroy programs or alter the operations of a
computer or network
Guaranteed Success
What is a cybersecurity threat? An event or condition that has the potential for causing
asset loss and the undesirable consequences or impact from such loss.
What types of assets are included in cybersecurity? Information, software, and hardware.
What are cybersecurity vulnerabilities? Weaknesses or flaws in system security procedures,
design, implementation, and control that could be compromised accidentally or intentionally.
What can result from cybersecurity vulnerabilities? 1. Security breaches
2. loss of information or data
3. system outages
4. violations of an organization's
5. system security policy
Why do governmental and corporate organizations maintain databases of software
vulnerabilities? To help prevent against known vulnerabilities by providing accessible
information organized by software version.
Social Engineering The manipulation of people to give up their confidential information,
such as bank information, passwords, and social security numbers.
What are the three common cybersecurity goals? 1. Protection of data, information, and
systems
2. Preservation of data, information, and system integrity
3. Promotion of authentication of data, systems, and information.
, Maintaining integrity in cybersecurity Through user-access controls, file permissions, and
version control of system and data files.
Authentication in cybersecurity A process that helps establish the origin of information or
confirm an individual's or entity's identity. Prevents unauthorized access
DDoS Attack Distributed Denial of Service is an external attack that makes computers or
online services unavailable to users. Done by flooding the resource with a ton of requests.
Malware External cyberattack - Any malicious software installed on a client or server
designed to harm, steal, or mess up systems
Features: ransomware, rootkit, zero-day exploit, virus, spyware, adware
Ransomware External cyberattack - Makes computer data inaccessible until a ransom is
paid. Often targets orgs that can't afford systems to be down such as hospitals. Usually done in
payments that are hard to trace such as Bitcoin
Rootkit External cyberattack - hides in the operating system (os) and is triggered each time
you boot the computer.
Allows another user to gain control over another system while undetected. Can install rouge
programs and delete files.
Zero-day exploit External cyberattack that targets software flaws that the developer doesn't
know about yet, so the attack hits before anyone can patch it
Virus External cyberattack that can either destroy programs or alter the operations of a
computer or network