CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 41

Information assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states. Question 50 ____ hack systems to conduct terrorist activities through network or Internet pathways. =================================================== CIS 359 Midterm Exam Set 2 FOR MORE CLASSES VISIT www.cis359study.com 1. One of the primary responsibilities of the IRP team is to ensure that the ____ is prepared to respond to each incident it may face. 2. A(n) ____ is a detailed examination of the events that occurred, from first detection of an incident to final recovery. 3. ____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired. 4. The Southeast Collegiate Cyber Defense Competition is unique in that it focuses on the operational aspect of managing and protecting an existing network infrastructure. Unlike “capture-the-flag ” exercises, this competition is exclusively a real-world ____ competition.