CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 43
14. ____ ensures that only those with the rights and privileges to access
information are able to do so.
15. ____ is a risk control approach that attempts to shift the risk to other
assets, other processes, or other organizations.
16. A ____ attack seeks to deny legitimate users access to services by
either tying up a server’s available resources or causing it to shut down.
17. Information assets have ____ when authorized users - persons or
computer systems - are able to access them in the specified format
without interference or obstruction.
18. The purpose of the ____ is to define the scope of the CP operations
and establish managerial intent with regard to timetables for response to
incidents, recovery from disasters, and reestablishment of operations for
continuity.
19. The ____ job functions and organizational roles focus on protecting
the organization’s information systems and stored information from
attacks.
20. The ____ is the point in time by which systems and data must be
recovered after an outage as determined by the business unit.
21. Within an organization, a(n) ____ is a group of individuals who are
united by shared interests or values and who have a common goal of
making the organization function to meet its objectives.
22. The ____ is used to collect information directly from the end users
and business managers.
23. The final component to the CPMT planning process is to deal with
____.