Strayer CIS 359 week 5 midterm.docx - Question 1 1 out of 1 points A is a document that describes how in the event of a disaster critical business

Strayer CIS 359 week 5 midterm.docx - Question 1 1 out of 1...

This preview shows page 1 - 5 out of 18 pages.

Question 11 out of 1 pointsA ____ is a document that describes how, in the event of a disaster, criticalbusiness functions continue at an alternate location while the organizationrecovers its ability to function at the primary site. Question 21 out of 1 points____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations. Question 31 out of 1 pointsA ____ deals with the preparation for and recovery from a disaster, whether natural or man-made.
Image of page 1
Question 41 out of 1 pointsThe term ____ refers to a broad category of electronic and human activitiesin which an unauthorized individual gains access to the information an organization is trying to protect. Question 51 out of 1 pointsA(n) ____ is used to anticipate, react to, and recover from events that threaten the security of information and information assets in an organization; it is also used to restore the organization to normal modes ofbusiness operations; Question 61 out of 1 points____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.
Image of page 2
Question 71 out of 1 pointsInformation assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states. Question 81 out of 1 points____ is the process of examining, documenting, and assessing the security posture of an organization’s information technology and the risks it faces. Question 91 out of 1 points____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.
Image of page 3
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 18 pages?

  • Spring '14
  • CSIRT

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture