100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Misy 5325 Midterm Actual Exam Newest 2025/2026 Complete Questions And Correct Detailed Answers (Verified Answers) |Brand New Version!!

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
05-10-2025
Written in
2025/2026

Misy 5325 Midterm Actual Exam Newest 2025/2026 Complete Questions And Correct Detailed Answers (Verified Answers) |Brand New Version!!

Institution
Misy 5325
Course
Misy 5325











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Misy 5325
Course
Misy 5325

Document information

Uploaded on
October 5, 2025
Number of pages
42
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Misy 5325 Midterm Actual Exam Newest 2025/2026
Complete Questions And Correct Detailed Answers
(Verified Answers) |Brand New Version!!


A new company does not have a lot of revenue for the first year. Installing
antivirus software for all the company's computers would be very costly, so the
owners decide to forgo purchasing antivirus software for the first year of the
business. In what domain of a typical IT infrastructure is a vulnerability created? -
ans -Workstation Domain

A technician in a large corporation fixes a printer that was not receiving an IP
address automatically by manually assigning it an address. The address was
assigned to a server that was offline and being upgraded. When the server was
brought online, it was no longer accessible. How could this problem have been
avoided? - ans -Through change management

A warm site is: - ans -a compromise between a hot site and a cold site.

A_____ is a computer joined to a botnet - ans -zombie

A______policy governs how patches are understood ,tested ,and rolled out to
systems and clients. - ans -patch management

A(n) _________ is the likelihood that something unexpected is going to occur. -
ans -risk

A(n) _________ provides secure access to a private network over a public
network such as the Internet. - ans -virtual private network (VPN)

A(n) _____________ is a process used to determine how to manage risk. - ans -
cost-benefit analysis (CBA)

A(n) ___________________ is performed to identify and evaluate risks. - ans -risk
assessment

,According to the World Intellectual Property Organization (WIPO), the two
categories of intellectual property (IP) are _______________ and
_______________. - ans -industrial property, copyright

Aditya is assessing the value of IT systems. His company sells sporting goods
online. One factor of his evaluation is the required availability of each system.
Some systems must be available 24/7, while others must be available during
regular business hours Monday through Friday. Which of the following would
have the highest availability requirements? - ans -E-commerce website server

Alice is an aspiring hacker. She wants to get information on computer and
network vulnerabilities and ways to exploit applications. Which of the following is
the best source? - ans -Dark web

All of following are examples of hardware assets, except: - ans -operating system.

All of the following are reasons why configuration management is an important
risk management process, except: - ans -it reduces unintended outages.

All of the following are true of risk assessment critical area identification, except: -
ans -when critical areas are identified, areas that are least critical to the business
should be the first priority.

All of the following are true of risk assessment scope identification, except: - ans -
the system or network administrator ultimately decides what is included in the
scope of a risk assessment.

All of the following terms have the same meaning, except: - ans -Internal network
zone

An exploit assessment is also known as a(n): - ans -penetration test.

Another term for risk mitigation is: - ans -risk reduction.

_______ are acts that are hostile to an organization. - ans -Intentional threats

,________ help(s) prevent a hard drive from being a single point of failure.
__________ help(s) prevent a server from being a single point of failure.
_________ help(s) prevent a person from being a single point of failure. - ans -
RAID, Failover clusters, Cross-training

_________ is the process of creating a list of threats. - ans -Threat identification

__________ damage for the sake of doing damage, and they often choose targets
of opportunity. - ans -Vandals

____________ assessments are objective, while ___________ assessments are
subjective. - ans -Quantitative, qualitative

_____________ is the likelihood that a threat will exploit a vulnerability. - ans -
Probability

A __________ is a computer joined to a botnet. - ans -zombie

A ___________ plan can help ensure that mission-critical systems continue to
function after a disaster. - ans -business continuity

A ___________ plan can help you identify steps needed to restore a failed
system. - ans -disaster recovery

A _____________ policy governs how patches are understood, tested, and rolled
out to systems and clients. - ans -patch management

A business impact analysis (BIA) is an important part of a _____________, and it
can also be part of a __________. - ans -business continuity plan, disaster
recovery plan


Carl is a security professional preparing to perform a risk assessment on database
servers. He is reviewing the findings of a previous risk assessment. He is trying to
determine which controls should be in place but were not implemented. Which of
the following is typically found in a risk assessment report and would address
Carl's needs? - ans -Current status of accepted recommendations

, Carl is a security specialist. He is updating the organization's hardware inventory
in the asset management system. Which of the following would be least helpful to
record? - ans -A competitor's product

Companies use risk assessment strategies to differentiate ___________ from
_________. - ans -severe risks, minor risks

Email addresses or domains ______________ are automatically marked as spam.
- ans -on a blacklist

Hajar is a security professional for a government contractor. Her company
recently hired three new employees for a special project, all of whom have a
security clearance for Secret data. Rather than granting the employees access to
all files and folders in the data repository, she is granting them access only to the
data they need for the project. What principle is Hajar following? - ans -Principle
of need to know

Hajar is a security specialist. Her organization has about 500 systems that must be
tracked for inventory purposes. She is preparing an email to her manager that
describes the benefits of including specific details about software in the
inventory, as well as the use of an automated asset management system. Which
of the following is not one of those benefits? - ans -The frequency of operating
system upgrades will be reduced.

Hardening a server refers to: - ans -the combination of all the steps that it takes to
protect a vulnerable system and make it more secure than the default installation.

How can you determine the importance of a system? - ans -By how the system is
used

In a quantitative risk assessment, what describes the loss that will happen to the
asset as a result of a threat? - ans -Exposure factor (EF)

In a risk assessment, which of the following refers to how responsibilities are
assigned? - ans -Management Structure

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Essiekarimi walden
View profile
Follow You need to be logged in order to follow users or courses
Sold
17
Member since
1 year
Number of followers
2
Documents
863
Last sold
10 hours ago
EXAM ESSENTIALS.

Welcome to your one-stop study hub! Where you Ace your exams with real exam past exams and high quality exam packs. Here you will find : >High quality' A graded study materials that have helped countless students succeed. > Comprehensive exam packs by topic eg pharmacology, Anatomy etc. >Instant downloads for quick and easy prep-anytime and anywhere. >High distinction study guides with answers. SAVE TIME, REDUCE ANXIEXTY AND REVISE WITH CONFIDENCE.

Read more Read less
4.0

4 reviews

5
3
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions