100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Network Security MIDTERM (Ch. 1 - 6) || 100% Accurate Answers.

Rating
-
Sold
-
Pages
43
Grade
A+
Uploaded on
30-08-2025
Written in
2025/2026

Matthew's manager Renee recently informed him that she was concerned about the possibility of a hacker tapping into their corporate database and altering customer records. What security goal is Renee concerned about achieving? a. Confidentiality b. Alteration c. Integrity d. Availability correct answers c. Integrity A janitor cleaning the floor of an organization's data center accidentally tripped over a power cord and cut the power to a critical file server. Users who depend on that data to complete their job functions are unable to access it and must take time off from work until IT personnel arrive and restore power to the computer. What security principle is most involved in this incident? a. Confidentiality b. Integrity c. Denial d. Alteration correct answers c. Denial Which one of the following DAD triad components is related to the CIA triad goal of integrity? a. Disclosure b. Denial c. Alteration correct answers c. Alteration DDoS attacks are a manifestation of which component of the DAD triad model of malicious activity?

Show more Read less
Institution
Network Security
Course
Network Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Network Security
Course
Network Security

Document information

Uploaded on
August 30, 2025
Number of pages
43
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Network Security MIDTERM (Ch. 1 - 6) || 100% Accurate Answers.


Matthew's manager Renee recently informed him that she was concerned about the possibility of
a hacker tapping into their corporate database and altering customer records. What security goal
is Renee concerned about achieving?


a. Confidentiality
b. Alteration
c. Integrity
d. Availability correct answers c. Integrity


A janitor cleaning the floor of an organization's data center accidentally tripped over a power
cord and cut the power to a critical file server. Users who depend on that data to complete their
job functions are unable to access it and must take time off from work until IT personnel arrive
and restore power to the computer. What security principle is most involved in this incident?


a. Confidentiality
b. Integrity
c. Denial
d. Alteration correct answers c. Denial


Which one of the following DAD triad components is related to the CIA triad goal of integrity?


a. Disclosure
b. Denial
c. Alteration correct answers c. Alteration


DDoS attacks are a manifestation of which component of the DAD triad model of malicious
activity?

,a. Disclosure
b. Denial
c. Alteration correct answers b. Denial


Which of the following types of attacks is not normally considered a malicious code object?


a. Virus
b. DoS
c. Worm
d. Trojan horse correct answers b. DoS


Which one of the following asset valuation techniques does not place dollar values on assets?


a. Depreciated valuation
b. Replacement cost valuation
c. Original cost valuation
d. Qualitative valuation correct answers d. Qualitative valuation


The failure of a security administrator to apply the most recent security patches to a system is an
example of ________________.


a. threat
b. risk
c. vulnerability
d. malicious code
e. denial of service correct answers c. Vulnerability

,Jim decides to purchase a business insurance policy to protect himself against liability from
hacker attack. What risk management technique is Jim practicing?


a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance correct answers c. Risk transference


Beth evaluated the potential risk of a hacker entering a specific system and decided that it did not
justify the cost of purchasing an expensive intrusion detection system. What type of risk
management is Beth practicing?


a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance correct answers d. Risk acceptance


Richard is responsible for evaluating whether his company should develop and host a Web site
on the corporate network. He decides that the risk posed to the site by hackers overwhelms the
benefit that would be gained from having the site and decides not to develop the site. What risk
management technique is Richard practicing?


a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance correct answers b. Risk avoidance

, Alex is the network administrator for an organization. He decides to implement a new firewall on
the company's broadband Internet connection to prevent hackers from entering the network.
What risk management technique is Alex practicing?


a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance correct answers a. Risk mitigation


Which of the following terms describes the percentage of an asset that managers expect to be
destroyed as the result of a given risk?


a. ALE
b. AV
c. SLE
d. EF
e. ARO correct answers d. EF


Which of the following terms describes the number of times per year that managers expect a risk
to occur?


a. ALE
b. AV
c. SLE
d. EF
e. ARO correct answers e. ARO


Which of the following terms describes the expected loss each time a given risk occurs?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
View profile
Follow You need to be logged in order to follow users or courses
Sold
737
Member since
3 year
Number of followers
437
Documents
34833
Last sold
1 day ago
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3.7

110 reviews

5
46
4
20
3
22
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions