Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C954 Flashcards-Section-Five || FULLY SOLVED || A+ RATED | 2026/27

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
31-10-2025
Written in
2025/2026

Ransomware - Correct Answer A form of malicious software that infects your computer and asks for money Spyware - Correct Answer A special class of adware that collects data about the user and transmit it over the internet without the users knowledge or permission Adware - Correct Answer Software that although purporting to serve some useful function and often fulfilling that function also allows internet advertisers to display advertisements without the consent of the computer user Worm - Correct Answer Spread itself not only from file to file but also from computer to computer without user intervention Virus - Correct Answer Software written with malicious intent to cause annoyance of damage Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network - Correct Answer A computer attack where an attacker accesses a wireless computer network intercepts data uses network services and or sends attack instruction without entering the office or organization that owns the networks Hacker - Correct Answer Experts in technology who use their knowledge to break into computer and computer networks either for profit or simply for the challenge Information security - Correct Answer A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization Downtime - Correct Answer Refers to a period of time when a system is unavailable Agile MIS infrastructure - Correct Answer Includes the hardware software and telecommunications equipment that when combined provide the underlining foundation to support the organization goals Sustainable MIS infrastructure - Correct Answer Identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption Backup - Correct Answer An exact copy of a system's information Recovery - Correct Answer The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup Fault tolerance - Correct Answer The ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service Failover - Correct Answer Occurs when redundant storage server offers an exact replica of the real time data and if the primary server crashes the users are automatically directed to the secondary server or backup server Failback - Correct Answer Occurs when the primary machine recovers and resumes operations taking over from the secondary server Disaster recovery plan - Correct Answer Detailed process for recovering information or a system in the event of a catastrophic disaster Hot site - Correct Answer A separate and fully equipped facility where the company can move immediately after a disaster and resume business Cold site - Correct Answer A separate facility that does not haven computer equipment but is place where employees can move after a disaster Warm site - Correct Answer A separate facility with computer equipment that requires installation and configuration Disaster recovery cost curve - Correct Answer Charts 1 the cost to the Organization of the unavailability of information and technology and 2 the cost to the organization of recovering from a disaster over time Emergency preparedness - Correct Answer Ensures a company is ready to respond to an emergency in an organized timely and effective manner Emergency - Correct Answer A sudden unexpected event requiring immediate action due to potential threat to health and safety the environment or property Business continuity planning (BCP) - Correct Answer Details how a company recovers and restores critical business operations and systems after a disaster or extended disruption Business impact analysis - Correct Answer A process that identifies all critical business functions and the effect that a specific disaster may have upon them Emergency notification service - Correct Answer An infrastructure built for notifying people in the event of an emergency Technology failure - Correct Answer Occurs when the ability of a company to operate is impaired because of a hardware software or data outage Incident management - Correct Answer The process responsible for managing how incidents are identified and corrected Incident record - Correct Answer Contains all of the details of an incident Incident - Correct Answer Unplanned interruption of service Technology recovery strategy - Correct Answer Focus specifically on prioritizing the order for restoring hardware software and data across the organization that best meets business recovery requirements Accessibility - Correct Answer Refers to the varying levels that define what a user can access view or perform when operating a system Administrator access - Correct Answer Unrestricted access to the entire system Web accessibility initiative (WAI) - Correct Answer Brings together people from industry disability organizations government and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities including auditory cognitive neurological physical speech and visualndisabilities Web accessibility - Correct Answer Means that people with disabilities including visual auditory cognitive neurological physical display can use the web Unavailable - Correct Answer Wanna system is not operating or cannot be used High availability - Correct Answer Occurs when a system is continuously operational at all times Maintainability or flexibility - Correct Answer Refers to how quickly a system can transform to support environmental changes Portability - Correct Answer Refers to the ability of an application to operate on different devices or software platforms such as a different operating system Reliability or accuracy - Correct Answer Ensure all systems are functioning correctly and providing accurate information Vulnerability - Correct Answer A system weakness they can be exploited by a threat for e

Show more Read less
Institution
Be The Business Challenge C954
Course
Be the business challenge C954

Content preview

C954 Flashcards-Section-Five || FULLY SOLVED ||
A+ RATED | 2026/27
Ransomware - Correct Answer A form of malicious software that infects your computer and
asks for money



Spyware - Correct Answer A special class of adware that collects data about the user and
transmit it over the internet without the users knowledge or permission



Adware - Correct Answer Software that although purporting to serve some useful function and
often fulfilling that function also allows internet advertisers to display advertisements without
the consent of the computer user



Worm - Correct Answer Spread itself not only from file to file but also from computer to
computer without user intervention



Virus - Correct Answer Software written with malicious intent to cause annoyance of damage



Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering the
office or organization that owns the network - Correct Answer A computer attack where an
attacker accesses a wireless computer network intercepts data uses network services and or
sends attack instruction without entering the office or organization that owns the networks



Hacker - Correct Answer Experts in technology who use their knowledge to break into
computer and computer networks either for profit or simply for the challenge



Information security - Correct Answer A broad term encompassing the protection of
information from accidental or intentional misuse by persons inside or outside an organization

, Downtime - Correct Answer Refers to a period of time when a system is unavailable



Agile MIS infrastructure - Correct Answer Includes the hardware software and
telecommunications equipment that when combined provide the underlining foundation to
support the organization goals



Sustainable MIS infrastructure - Correct Answer Identifies ways that a company can grow in
terms of computing resources while simultaneously becoming less dependent on hardware and
energy consumption



Backup - Correct Answer An exact copy of a system's information



Recovery - Correct Answer The ability to get a system up and running in the event of a system
crash or failure and includes restoring the information backup



Fault tolerance - Correct Answer The ability for a system to respond to unexpected failures or
system crashes as the backup system immediately and automatically takes over with no loss of
service



Failover - Correct Answer Occurs when redundant storage server offers an exact replica of the
real time data and if the primary server crashes the users are automatically directed to the
secondary server or backup server



Failback - Correct Answer Occurs when the primary machine recovers and resumes operations
taking over from the secondary server



Disaster recovery plan - Correct Answer Detailed process for recovering information or a
system in the event of a catastrophic disaster

Written for

Institution
Be the business challenge C954
Course
Be the business challenge C954

Document information

Uploaded on
October 31, 2025
Number of pages
10
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lydiah247 West Virgina University
Follow You need to be logged in order to follow users or courses
Sold
33
Member since
2 year
Number of followers
10
Documents
2867
Last sold
3 weeks ago
SHINE

Welcome to my page- you are able to get revision questions,Summary notes and Exams that help you pass .

2.2

5 reviews

5
1
4
0
3
1
2
0
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions