CIS 359 Midterm Exam Set 1 (2) CIS 359 Midterm Exam Set 1 (2) | Page 10
Question 45
A(n) ____ is any clearly identified attack on the organization’s information assets that would
threaten the assets’ confidentiality, integrity, or availability.
Question 46
A ____ is a document that describes how, in the event of a disaster, critical business functions
continue at an alternate location while the organization recovers its ability to function at the
primary site.
Question 47
A(n) ____ is an object, person, or other entity that is a potential risk of loss to an asset.
Question 48
A(n) ____ is used to anticipate, react to, and recover from events that threaten the security of
information and information assets in an organization; it is also used to restore the organization
to normal modes of business operations;
Question 49
Information assets have ____ when they are not exposed (while being stored, processed, or
transmitted) to corruption, damage, destruction, or other disruption of their authentic states.