CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 41
Information assets have ____ when they are not exposed (while being
stored, processed, or transmitted) to corruption, damage, destruction, or
other disruption of their authentic states.
Question 50
____ hack systems to conduct terrorist activities through network or
Internet pathways.
===================================================
CIS 359 Midterm Exam Set 2
FOR MORE CLASSES VISIT
www.cis359study.com
1. One of the primary responsibilities of the IRP team is to ensure
that the ____ is prepared to respond to each incident it may face.
2. A(n) ____ is a detailed examination of the events that occurred,
from first detection of an incident to final recovery.
3. ____ is the process of systematically examining information assets
for evidentiary material that can provide insight into how an incident
transpired.
4. The Southeast Collegiate Cyber Defense Competition is unique in
that it focuses on the operational aspect of managing and protecting an
existing network infrastructure. Unlike “capture-the-flag ” exercises, this
competition is exclusively a real-world ____ competition.