MISY 5325 EXAMS SET 2026 FULL
SOLUTION VIEW AHEAD QUESTIONS AND
ANSWERS GRADED A+
●● 2. Which of the following is an example of acting upon the goal of
integrity?
A. Ensuring that only authorized users can access data
B. Ensuring that systems have 99.9% uptime
C. Ensuring that all modifications go through a change-control process
D. Ensuring that changes can be traced back to the editor. Answer: C.
Ensuring that all modifications go through a change-control process
D. Ensuring that changes can be traced back to the editor
●● 3. Which of the following is a control that relates to availability?
A. Disaster recovery site
B. Data loss prevention (DLP) system
C. Training
D. Encryption. Answer: A. Disaster recovery site
●● 4. Which of the following is an objective of confidentiality?
, A. Protection from unauthorized access
B. Protection from manipulation
C. Protection from denial of service
D. Protection from authorized access. Answer: A. Protection from
unauthorized access
●● 5. Which of the following is a good definition for confidentiality?
(Select all that apply.)
A. The property that information is not made available or disclosed to
unauthorized individuals, entities, or processes
B. The processes, policies, and controls used to develop confidence that
security measures are working as intended
C. The positive identification of the person or system seeking access to
secured information or systems
D. The logging of access and usage of information resources. Answer:
A. The property that information is not made available or disclosed to
unauthorized individuals, entities, or processes
●● 6. An important element of confidentiality is that all sensitive data
needs to be controlled, audited, and monitored at all times. Which of the
following provides an example about how data can be protected?
SOLUTION VIEW AHEAD QUESTIONS AND
ANSWERS GRADED A+
●● 2. Which of the following is an example of acting upon the goal of
integrity?
A. Ensuring that only authorized users can access data
B. Ensuring that systems have 99.9% uptime
C. Ensuring that all modifications go through a change-control process
D. Ensuring that changes can be traced back to the editor. Answer: C.
Ensuring that all modifications go through a change-control process
D. Ensuring that changes can be traced back to the editor
●● 3. Which of the following is a control that relates to availability?
A. Disaster recovery site
B. Data loss prevention (DLP) system
C. Training
D. Encryption. Answer: A. Disaster recovery site
●● 4. Which of the following is an objective of confidentiality?
, A. Protection from unauthorized access
B. Protection from manipulation
C. Protection from denial of service
D. Protection from authorized access. Answer: A. Protection from
unauthorized access
●● 5. Which of the following is a good definition for confidentiality?
(Select all that apply.)
A. The property that information is not made available or disclosed to
unauthorized individuals, entities, or processes
B. The processes, policies, and controls used to develop confidence that
security measures are working as intended
C. The positive identification of the person or system seeking access to
secured information or systems
D. The logging of access and usage of information resources. Answer:
A. The property that information is not made available or disclosed to
unauthorized individuals, entities, or processes
●● 6. An important element of confidentiality is that all sensitive data
needs to be controlled, audited, and monitored at all times. Which of the
following provides an example about how data can be protected?