Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ISM 4220 EXAM 2 QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
27-03-2026
Written in
2025/2026

ISM 4220 EXAM 2 QUESTIONS AND ANSWERS

Institution
ISM 4220
Course
ISM 4220

Content preview

ISM 4220 EXAM 2 QUESTIONS AND ANSWERS

Any use of IT resources that exceeds the authorization granted by the owner is known
as? - Answers - hacking

Which is the only valid reason for attacking your own production network? - Answers -
proactive penetration testing

All use of computational resources in excess of authorization is known as? - Answers -
hacking

The key in analysis of defense products is to focus on finding _______. - Answers -
weakest link

Balancing cost of protection with cost of breach / data is known as? - Answers - risk
analysis

One of the lessons from the Target breach is that security is a _____ not a product. -
Answers - process

What was the first step in the target hack? - Answers - spear phishing

Do most IT security measures still work if physical security is compromised? (yes or no)
- Answers - no

In proper network segmentation practices, what is the common name for the area used
for servers that have public facing services? - Answers - demilitarized zones (dmz)

In the "Plan-Protect-______ cycle", the most resources should be spent on the
protection phase. - Answers - respond

Fraudulent emails sent to users in an attempt to get information or compromise their
system is known as ______. - Answers - phishing

The practice of using mathematics to hide, protect, or jumble information in a way that it
can be recovered again in the right conditions? - Answers - cryptography

Any software with evil intentions is known as: - Answers - malware

Compliance regulations are starting to mandate comprehensive visibility and control
over individual employee access to and permissions on all resources. These policies,
controls and systems are all part of ______. - Answers - access control

What style of permissions is recommended that users are granted when access is
needed? - Answers - least permissions

Written for

Institution
ISM 4220
Course
ISM 4220

Document information

Uploaded on
March 27, 2026
Number of pages
2
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUEENS Harvard University
Follow You need to be logged in order to follow users or courses
Sold
226
Member since
4 year
Number of followers
180
Documents
4503
Last sold
1 month ago

4.1

61 reviews

5
35
4
10
3
8
2
3
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions