MISY 5325 MIDTERM ACTUAL EXAM 2024-
2025 WITH COMPLETE QUESTIONS AND
ACCURATE ANSWERS RATED A+
A technician in a large corporation fixes a printer that was not
receiving an IP address automatically by manually assigning it an
address. The address was assigned to a server that was offline
and being upgraded. When the server was brought online, it was
no longer accessible. How could this problem have been
avoided? Correct Answer Through change management
A warm site is: Correct Answer a compromise between a hot site
and a cold site.
A_____ is a computer joined to a botnet Correct Answer zombie
A______policy governs how patches are understood ,tested ,and
rolled out to systems and clients. Correct Answer patch
management
A(n) _________ is the likelihood that something unexpected is
going to occur. Correct Answer risk
A(n) _________ provides secure access to a private network over
a public network such as the Internet. Correct Answer virtual
private network (VPN)
A(n) _____________ is a process used to determine how to
manage risk. Correct Answer cost-benefit analysis (CBA)
A(n) ___________________ is performed to identify and evaluate
risks. Correct Answer risk assessment
,According to the World Intellectual Property Organization (WIPO),
the two categories of intellectual property (IP) are
_______________ and _______________. Correct Answer
industrial property, copyright
Aditya is assessing the value of IT systems. His company sells
sporting goods online. One factor of his evaluation is the required
availability of each system. Some systems must be available
24/7, while others must be available during regular business
hours Monday through Friday. Which of the following would have
the highest availability requirements? Correct Answer E-
commerce website server
Alice is an aspiring hacker. She wants to get information on
computer and network vulnerabilities and ways to exploit
applications. Which of the following is the best source? Correct
Answer Dark web
All of following are examples of hardware assets, except: Correct
Answer operating system.
All of the following are reasons why configuration management is
an important risk management process, except: Correct Answer
it reduces unintended outages.
All of the following are true of risk assessment critical area
identification, except: Correct Answer when critical areas are
identified, areas that are least critical to the business should be
the first priority.
All of the following are true of risk assessment scope
identification, except: Correct Answer the system or network
administrator ultimately decides what is included in the scope of a
risk assessment.
, All of the following terms have the same meaning, except: Correct
Answer Internal network zone
An exploit assessment is also known as a(n): Correct Answer
penetration test.
Another term for risk mitigation is: Correct Answer risk reduction.
Carl is a security professional preparing to perform a risk
assessment on database servers. He is reviewing the findings of
a previous risk assessment. He is trying to determine which
controls should be in place but were not implemented. Which of
the following is typically found in a risk assessment report and
would address Carl's needs? Correct Answer Current status of
accepted recommendations
Carl is a security specialist. He is updating the organization's
hardware inventory in the asset management system. Which of
the following would be least helpful to record? Correct Answer A
competitor's product
Companies use risk assessment strategies to differentiate
___________ from _________. Correct Answer severe risks,
minor risks
Email addresses or domains ______________ are automatically
marked as spam. Correct Answer on a blacklist
Hajar is a security professional for a government contractor. Her
company recently hired three new employees for a special
project, all of whom have a security clearance for Secret data.
Rather than granting the employees access to all files and folders
in the data repository, she is granting them access only to the
data they need for the project. What principle is Hajar following?
Correct Answer Principle of need to know
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller wachiraMaureen. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $26.07. You're not tied to anything after your purchase.