100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISM Exam 4 || with Complete Solutions.

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
01-12-2025
Written in
2025/2026

ISM Exam 4 || with Complete Solutions.

Institution
ISM
Course
ISM









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISM
Course
ISM

Document information

Uploaded on
December 1, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISM Exam 4 || with Complete Solutions.
Two reasons to secure data correct answers 1. Data is the most powerful asset we have
2. Privacy regulations

Reasons to secure info systems themselves correct answers computers themselves could be
hacked

digital identities correct answers log-in credentials such as username and password

annual growth rate for security incidents correct answers 66%

Zero Day Exploit correct answers The situation where on the very day the software engineers
or cyber security workers learn about the problems, the hackers are already exploiting this
flaw

Biggest hack in history correct answers Spam email malware and five months worth of
service lost

Categories of IT vulnerability correct answers Physical, technological and human

Physical Vulnerabilities: Lost Laptops- percentage lost correct answers 7%

Physical Vulnerabilities: __% of smartphones lost each year, and about __% had sensitive
data, __% unprotected correct answers 5%; 60%; 57%

Physical Vulnerabilities: Flash drives; each data record loss costs a company about $___; __
% of companies suffered loss of sensitive/confidential info correct answers $214 per data;
70%

Physical Vulnerabilities: What is Shoulder Surfing? correct answers Someone is looking over
your shoulder to see sensitive data

Physical Vulnerabilities: Dumpster diving; what kind of info found here? What kind of things
found here? correct answers "Gold Mine of Information"
1. Pre-attack research to receive data about the company
2. Sensitive company info
Things:
Printouts with source code, media with passwords, phone lists with phone numbers

Physical Vulnerabilities: Equipment Disposal correct answers Hard drives may store
documents on them that you may not think to wipe before donating or getting rid of it

Technological Vulnerabilities: Software Bugs; what is a bug? Is it reasonable to expect that
large software systems would be truly and totally bug-free? What can an attacker do with a
bug? correct answers Bug- programming flaw/oversight; No- it is easy to make a mistake in
systems that have millions of lines of code; Exploit it by running malware, accessing data, or
gaining full control of the system

, Tech Vulnerabilities: Passwords- 3 User Password Vulnerabilities correct answers Sticky
note, guessable, lack of complexity

Tech Vulnerabilities: Mobile and BYOD: organizations spend most of their IT security
dollars protecting _______ ________, which are unprotected because they spend much time
__________ _____ __________. correct answers mobile devices; outside the walls

Two examples of mobile/BYOD technical risks correct answers Direct Data Flow, Mobile
Sync

Direct Data Flow correct answers A quarter of data traffic goes directly from mobile devices
and into the cloud, bypassing traditional "castle wall" security defense; this is a tech
vulnerability

Mobile Sync correct answers 40% of enterprise contact info leaks into Facebook via
employee's increased use of mobile device collaboration systems (sync)

Human Vulnerabilities: Social Engineering correct answers Outsider exploits a naïve insider;
trickery

Human: "Insider"; what percentage of insiders are involved in incidents? Why would they be
a serious threat? correct answers current or former employee, contract or other partner that
has had or has now authorized access to an organization's network, servers or data; 70%; if
you do not cut them off from data after the cease working

What are the real drivers behind modern cyber-attacks? correct answers Money and power

Source of the most malicious hacking and their characteristics correct answers Cyber Crime
Syndicates

Hacktivists correct answers A loosely grouped set of people dedicated to political activism;
seek publicity and fame on behalf of their political cause

Goals of hacktivists correct answers Cause monetary pain, embarrass victim or cause pain,
seek public support

Strategies used by hacktivists correct answers 1. Denial of Service attack: the attackers
overwhelm victim's network or servers with requests (denies service to actual customers)
2. Info Exposure- embarrass the victim by exposing the their data

What is IP? correct answers Intellectual Property- creations of the mind

Why is IP stolen? correct answers To be sold to someone else

"determined human adversary" correct answers common in IP theft; this is someone
undeterred by early failures (repeat attacks, variety of techniques, significant resources)

What is the Digital Workplace? What is its goal? How does it accomplish that goal? correct
answers A business strategy to boost employee engagement and agility through a more
consumerized work environment

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
FullyFocus NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Follow You need to be logged in order to follow users or courses
Sold
734
Member since
3 year
Number of followers
437
Documents
34567
Last sold
2 weeks ago
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3,7

110 reviews

5
46
4
20
3
22
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions