This document contains 50 multiple choice questions related to CIS 359 at Strayer University. The questions cover topics such as virtualization, backup types, cloud computing, RAID configurations, network-attached storage, disaster recovery facilities, liability clauses, resumption locations, service level agreements, incident response planning, forensic investigation processes, network diagrams, incident response plans, incident reports, cyber defense competitions, anonymous incident reporting, training delivery methods, intrusion detection policies, honeypots, intrusion detection software, log file reviews, autonomous response systems, electronic communications privacy, DNS spoofing attacks, continuity plans, business impact analyses, risk assessments, business process models, end user surveys, cost-benefit analyses, intrusion detection systems, organizational groups,