CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 34

• Question 35 A ____ deals with the preparation for and recovery from a disaster, whether natural or man-made. • Question 36 The term ____ refers to a broad category of electronic and human activities in which an unauthorized individual gains access to the information an organization is trying to protect. • Question 37 ____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation. • Question 38 A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organization. • Question 39 A ____ attack seeks to deny legitimate users access to services by either tying up a server’s available resources or causing it to shut down. • Question 40 Information assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction. • Question 41 The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe. • Question 42