CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 56

• Question 37 ____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation. • Question 38 A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organization. • Question 39 A ____ attack seeks to deny legitimate users access to services by either tying up a server’s available resources or causing it to shut down. • Question 40 Information assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction. • Question 41