CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 56
•
Question 37
____ of risk is the choice to do nothing to protect an information asset
and to accept the outcome of its potential exploitation.
•
Question 38
A(n) ____ is an investigation and assessment of the impact that various
attacks can have on the organization.
•
Question 39
A ____ attack seeks to deny legitimate users access to services by either
tying up a server’s available resources or causing it to shut down.
•
Question 40
Information assets have ____ when authorized users - persons or
computer systems - are able to access them in the specified format
without interference or obstruction.
•
Question 41