Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

ISM Exam 4 || with Complete Solutions.

Note
-
Vendu
-
Pages
9
Grade
A+
Publié le
01-12-2025
Écrit en
2025/2026

ISM Exam 4 || with Complete Solutions.

Établissement
ISM
Cours
ISM









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
ISM
Cours
ISM

Infos sur le Document

Publié le
1 décembre 2025
Nombre de pages
9
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

ISM Exam 4 || with Complete Solutions.
Two reasons to secure data correct answers 1. Data is the most powerful asset we have
2. Privacy regulations

Reasons to secure info systems themselves correct answers computers themselves could be
hacked

digital identities correct answers log-in credentials such as username and password

annual growth rate for security incidents correct answers 66%

Zero Day Exploit correct answers The situation where on the very day the software engineers
or cyber security workers learn about the problems, the hackers are already exploiting this
flaw

Biggest hack in history correct answers Spam email malware and five months worth of
service lost

Categories of IT vulnerability correct answers Physical, technological and human

Physical Vulnerabilities: Lost Laptops- percentage lost correct answers 7%

Physical Vulnerabilities: __% of smartphones lost each year, and about __% had sensitive
data, __% unprotected correct answers 5%; 60%; 57%

Physical Vulnerabilities: Flash drives; each data record loss costs a company about $___; __
% of companies suffered loss of sensitive/confidential info correct answers $214 per data;
70%

Physical Vulnerabilities: What is Shoulder Surfing? correct answers Someone is looking over
your shoulder to see sensitive data

Physical Vulnerabilities: Dumpster diving; what kind of info found here? What kind of things
found here? correct answers "Gold Mine of Information"
1. Pre-attack research to receive data about the company
2. Sensitive company info
Things:
Printouts with source code, media with passwords, phone lists with phone numbers

Physical Vulnerabilities: Equipment Disposal correct answers Hard drives may store
documents on them that you may not think to wipe before donating or getting rid of it

Technological Vulnerabilities: Software Bugs; what is a bug? Is it reasonable to expect that
large software systems would be truly and totally bug-free? What can an attacker do with a
bug? correct answers Bug- programming flaw/oversight; No- it is easy to make a mistake in
systems that have millions of lines of code; Exploit it by running malware, accessing data, or
gaining full control of the system

, Tech Vulnerabilities: Passwords- 3 User Password Vulnerabilities correct answers Sticky
note, guessable, lack of complexity

Tech Vulnerabilities: Mobile and BYOD: organizations spend most of their IT security
dollars protecting _______ ________, which are unprotected because they spend much time
__________ _____ __________. correct answers mobile devices; outside the walls

Two examples of mobile/BYOD technical risks correct answers Direct Data Flow, Mobile
Sync

Direct Data Flow correct answers A quarter of data traffic goes directly from mobile devices
and into the cloud, bypassing traditional "castle wall" security defense; this is a tech
vulnerability

Mobile Sync correct answers 40% of enterprise contact info leaks into Facebook via
employee's increased use of mobile device collaboration systems (sync)

Human Vulnerabilities: Social Engineering correct answers Outsider exploits a naïve insider;
trickery

Human: "Insider"; what percentage of insiders are involved in incidents? Why would they be
a serious threat? correct answers current or former employee, contract or other partner that
has had or has now authorized access to an organization's network, servers or data; 70%; if
you do not cut them off from data after the cease working

What are the real drivers behind modern cyber-attacks? correct answers Money and power

Source of the most malicious hacking and their characteristics correct answers Cyber Crime
Syndicates

Hacktivists correct answers A loosely grouped set of people dedicated to political activism;
seek publicity and fame on behalf of their political cause

Goals of hacktivists correct answers Cause monetary pain, embarrass victim or cause pain,
seek public support

Strategies used by hacktivists correct answers 1. Denial of Service attack: the attackers
overwhelm victim's network or servers with requests (denies service to actual customers)
2. Info Exposure- embarrass the victim by exposing the their data

What is IP? correct answers Intellectual Property- creations of the mind

Why is IP stolen? correct answers To be sold to someone else

"determined human adversary" correct answers common in IP theft; this is someone
undeterred by early failures (repeat attacks, variety of techniques, significant resources)

What is the Digital Workplace? What is its goal? How does it accomplish that goal? correct
answers A business strategy to boost employee engagement and agility through a more
consumerized work environment
€9,90
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
FullyFocus NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
734
Membre depuis
3 année
Nombre de followers
437
Documents
34567
Dernière vente
2 semaines de cela
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lire la suite Lire moins
3,7

110 revues

5
46
4
20
3
22
2
8
1
14

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions