CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 34
•
Question 35
A ____ deals with the preparation for and recovery from a disaster,
whether natural or man-made.
•
Question 36
The term ____ refers to a broad category of electronic and human
activities in which an unauthorized individual gains access to the
information an organization is trying to protect.
•
Question 37
____ of risk is the choice to do nothing to protect an information asset
and to accept the outcome of its potential exploitation.
•
Question 38
A(n) ____ is an investigation and assessment of the impact that
various attacks can have on the organization.
•
Question 39
A ____ attack seeks to deny legitimate users access to services by
either tying up a server’s available resources or causing it to shut
down.
•
Question 40
Information assets have ____ when authorized users - persons or
computer systems - are able to access them in the specified format
without interference or obstruction.
•
Question 41
The ____ illustrates the most critical characteristics of information
and has been the industry standard for computer security since the
development of the mainframe.
•
Question 42