CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 25
one of these mechanisms should permit people to report incidents
____.
9. A(n) ____ is an object, person, or other entity that is a potential
risk of loss to an asset.
10. A(n) ____ is used to anticipate, react to, and recover from events
that threaten the security of information and information assets in an
organization; it is also used to restore the organization to normal
modes of business operations;
11. A ____ is a document that describes how, in the event of a
disaster, critical business functions continue at an alternate location
while the organization recovers its ability to function at the primary
site.
12. ____ hack systems to conduct terrorist activities through network
or Internet pathways.
13. ____ is the risk control approach that attempts to reduce the
impact caused by the exploitation of vulnerability through planning
and preparation.
14. ____ ensures that only those with the rights and privileges to
access information are able to do so.
15. ____ is a risk control approach that attempts to shift the risk to
other assets, other processes, or other organizations.
16. A ____ attack seeks to deny legitimate users access to services by
either tying up a server’s available resources or causing it to shut
down.
17. Information assets have ____ when authorized users - persons or
computer systems - are able to access them in the specified format
without interference or obstruction.
18. The purpose of the ____ is to define the scope of the CP
operations and establish managerial intent with regard to timetables