MISY 5325 FINAL PAPER EXAM 2026
PRACTICE SOLUTION TESTED QUESTIONS
AND ANSWERS GRADED A+
●● ________ help(s) prevent a hard drive from being a single point of
failure. __________ help(s) prevent a server from being a single point of
failure. _________ help(s) prevent a person from being a single point of
failure. Answer: RAID, Failover clusters, Cross-training
●● _________ is the process of creating a list of threats. Answer: Threat
identification
●● __________ damage for the sake of doing damage, and they often
choose targets of opportunity. Answer: Vandals
●● ____________ assessments are objective, while ___________
assessments are subjective. Answer: Quantitative, qualitative
●● _____________ is the likelihood that a threat will exploit a
vulnerability. Answer: Probability
●● A __________ is a computer joined to a botnet. Answer: zombie
,●● A ___________ plan can help ensure that mission-critical systems
continue to function after a disaster. Answer: business continuity
●● A ___________ plan can help you identify steps needed to restore a
failed system. Answer: disaster recovery
●● A _____________ policy governs how patches are understood,
tested, and rolled out to systems and clients. Answer: patch management
●● A business impact analysis (BIA) is an important part of a
_____________, and it can also be part of a __________. Answer:
business continuity plan, disaster recovery plan
●● A new company does not have a lot of revenue for the first year.
Installing antivirus software for all the company's computers would be
very costly, so the owners decide to forgo purchasing antivirus software
for the first year of the business. In what domain of a typical IT
infrastructure is a vulnerability created? Answer: Workstation Domain
●● A technician in a large corporation fixes a printer that was not
receiving an IP address automatically by manually assigning it an
address. The address was assigned to a server that was offline and being
upgraded. When the server was brought online, it was no longer
accessible. How could this problem have been avoided? Answer:
Through change management
, ●● A warm site is: Answer: a compromise between a hot site and a cold
site.
●● A_____ is a computer joined to a botnet Answer: zombie
●● A______policy governs how patches are understood ,tested ,and
rolled out to systems and clients. Answer: patch management
●● A(n) _________ is the likelihood that something unexpected is going
to occur. Answer: risk
●● A(n) _________ provides secure access to a private network over a
public network such as the Internet. Answer: virtual private network
(VPN)
●● A(n) _____________ is a process used to determine how to manage
risk. Answer: cost-benefit analysis (CBA)
●● A(n) ___________________ is performed to identify and evaluate
risks. Answer: risk assessment
●● According to the World Intellectual Property Organization (WIPO),
the two categories of intellectual property (IP) are _______________
and _______________. Answer: industrial property, copyright
PRACTICE SOLUTION TESTED QUESTIONS
AND ANSWERS GRADED A+
●● ________ help(s) prevent a hard drive from being a single point of
failure. __________ help(s) prevent a server from being a single point of
failure. _________ help(s) prevent a person from being a single point of
failure. Answer: RAID, Failover clusters, Cross-training
●● _________ is the process of creating a list of threats. Answer: Threat
identification
●● __________ damage for the sake of doing damage, and they often
choose targets of opportunity. Answer: Vandals
●● ____________ assessments are objective, while ___________
assessments are subjective. Answer: Quantitative, qualitative
●● _____________ is the likelihood that a threat will exploit a
vulnerability. Answer: Probability
●● A __________ is a computer joined to a botnet. Answer: zombie
,●● A ___________ plan can help ensure that mission-critical systems
continue to function after a disaster. Answer: business continuity
●● A ___________ plan can help you identify steps needed to restore a
failed system. Answer: disaster recovery
●● A _____________ policy governs how patches are understood,
tested, and rolled out to systems and clients. Answer: patch management
●● A business impact analysis (BIA) is an important part of a
_____________, and it can also be part of a __________. Answer:
business continuity plan, disaster recovery plan
●● A new company does not have a lot of revenue for the first year.
Installing antivirus software for all the company's computers would be
very costly, so the owners decide to forgo purchasing antivirus software
for the first year of the business. In what domain of a typical IT
infrastructure is a vulnerability created? Answer: Workstation Domain
●● A technician in a large corporation fixes a printer that was not
receiving an IP address automatically by manually assigning it an
address. The address was assigned to a server that was offline and being
upgraded. When the server was brought online, it was no longer
accessible. How could this problem have been avoided? Answer:
Through change management
, ●● A warm site is: Answer: a compromise between a hot site and a cold
site.
●● A_____ is a computer joined to a botnet Answer: zombie
●● A______policy governs how patches are understood ,tested ,and
rolled out to systems and clients. Answer: patch management
●● A(n) _________ is the likelihood that something unexpected is going
to occur. Answer: risk
●● A(n) _________ provides secure access to a private network over a
public network such as the Internet. Answer: virtual private network
(VPN)
●● A(n) _____________ is a process used to determine how to manage
risk. Answer: cost-benefit analysis (CBA)
●● A(n) ___________________ is performed to identify and evaluate
risks. Answer: risk assessment
●● According to the World Intellectual Property Organization (WIPO),
the two categories of intellectual property (IP) are _______________
and _______________. Answer: industrial property, copyright