100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Misy 5325 Midterm Exam Questions with 100% Correct Answers | Verified | Latest Update graded A+

Rating
-
Sold
-
Pages
48
Grade
A+
Uploaded on
15-09-2025
Written in
2025/2026

Enforcement of Gramm-Leach-Bliley Act (GLBA) was assigned to federal oversight agencies, including all except: - Answer- Securities Investor Protection Corporation (SIPC) Which of the following is another term for statutory law? - Answer- Legislation Regulatory compliance is a powerful driver for many organizations. - Answer- True What are the possible outcomes of policy review? - Answer- The policy is retired or reauthorized

Show more Read less
Institution
Misy 5325
Course
Misy 5325

Content preview

Misy 5325 Midterm Exam Questions with
100% Correct Answers | Verified | Latest
Update graded A+
Enforcement of Gramm-Leach-Bliley Act (GLBA) was assigned to federal oversight agencies,
including all except: - Answer- Securities Investor Protection Corporation (SIPC)



Which of the following is another term for statutory law? - Answer- Legislation



Regulatory compliance is a powerful driver for many organizations. - Answer- True



What are the possible outcomes of policy review? - Answer- The policy is retired or
reauthorized



Which of the following is not an example of an information asset? - Answer- Building
directory



Which of the following statements is true? - Answer- Policies should require only what is
possible.



A cybersecurity policy must take into account all these factors except: - Answer- The cultural
norms of the general public



Which of the following is the correct order of the policy life cycle? - Answer- Develop,
publish, adopt, review



Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS devices,
segmentation, and VLANs? - Answer- Perimeter security

,Which of the following can be defined as the shared attitudes, goals, and practices that
characterize a company, corporation, or institution? - Answer- Corporate culture



One of the most common ways to protect the confidentiality of a system or its data is with
__________. - Answer- encryption



A(n) __________ has the authority and responsibility for ensuring that information is protected,
from creation through destruction. - Answer- information owner



__________ is the requirement that private or confidential information not be disclosed to
unauthorized individuals. - Answer- Confidentiality



User productivity is unaffected if data is not available. - Answer- False



Confidentiality, integrity, and accessibility (CIA) are the unifying attributes of an information
security program. - Answer- False



Inherent risk is the level of risk ater security measures are applied. - Answer- False



It is the __________ department's responsiblity for measuring compliance with Board-approved
policies and to ensure that controls are functioning as intended. - Answer- internal audit



A(n) __________ approach to cybersecurity assigns responsibility for being secure to the IT
department. - Answer- silo-based



A(n) __________ audit is a systematic, evidence-based evaluation of how well the organization
conforms to such established criteria as Board-approved policies, regulatory requirements,
and internationally recognized standards. - Answer- cybersecurity

,The __________ team is responsible for responding to and managing security-related incidents.
- Answer- incident response



Loss, corruption, or unauthorized disclosure of internal use data will always impair the
business or will always result in business, financial, or legal loss. - Answer- False



Secure access controls are protection related to: - Answer- data in rest



Examples include nonpublic personal information (NPPI) include all but: - Answer- listed
phone number



The success of an information security program is not directly related to the defined
relationship between the data owner and the information. - Answer- False



__________ potential impact means the loss of CIA could be expected to have a severe or
catastrophic adverse effect on organizational operations, organizational assets, or individuals.
- Answer- High



Layered defense is neither physical nor psychological. - Answer- False



Fire prevention controls include all BUT the following: - Answer- improper handling and
storage procedures for flammable/combustible materials



When looking for a location, best practices dictate that critical information-processing
facilities be while labeled with company signs and logos. - Answer- False



__________ are files that the operating system by design does not display. - Answer- Hidden
files



__________ is recognizing that there is a fire. - Answer- Fire detection

, The NIST Cybersecurity Framework Tiers include all of these categories EXCEPT: - Answer-
Internal Participation



The NIST Cybersecurity Framework cannot be used to translate among a variety of risk
management practices. - Answer- False



The NIST Cybersecurity Framework __________ is/are a collection of cybersecurity activities,
outcomes, and informative references that are common across critical infrastructure sectors. -
Answer- Core



The NIST Cybersecurity Framework __________ is/are designed to help organizations to view
and understand the characteristics of their approach to managing cybersecurity risk. -
Answer- Tiers



The NIST Cybersecurity Framework Core subcategory outcomes are meaningful for multiple
requirements. - Answer- True



__________ group the elements of a function into collections of cybersecurity outcomes. -
Answer- Categories



The four (4) NIST Cybersecurity Framework Tiers are: - Answer- "partial, risk-informed,
repeatable, adaptive"



In the NIST s Cybersecurity Framework Coordination model, the executive level
communicates the mission priorities, available resources, and overall risk tolerance to the
__________ level. - Answer- business/process



"Using specially crafted phone calls during a corporate account takeover, criminals capture a
business s online banking credentials or compromise the workstation used for online
banking." - Answer- False

Written for

Institution
Misy 5325
Course
Misy 5325

Document information

Uploaded on
September 15, 2025
Number of pages
48
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Academicaffairs Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
270
Member since
3 year
Number of followers
221
Documents
1394
Last sold
1 day ago

3.9

35 reviews

5
16
4
7
3
8
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions