Test Bank
Corporate Cybersecurity
By Randall J Boyle, Raymond R. Panko
6th Edition
,Test Bank For
Corporate Cybersecurity, 6th Edition Randall J Boyle Raymond R. Panko
All Chapters
Corporate Computer Security, 6e (Boyle/Panko)
Chapter 1 The Threat Environment
1) The Process Of Protecting Computer Hardware, Networks, Data, And Applications
From Attackers Is Called .
A) Cybersecurity
B) The Threat Environment
C) A Data Breach
D) A
Countermeasure
Answer: A
Page Ref: 16
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
2) If An Attacker Breaks Into A Corporate Database And Deletes Critical Files, This
Is An Attack Against The Security Goal.
A) Confidentiality
B) Integrity
C) Availability
D) Cia
Answer: B
Page Ref: 20
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
3) Which Of The Following Is A Type Of Countermeasure?
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
,Difficulty: Moderate
4) The Most Common Type Of Attack Appears To Be .
A) Phishing
B) Compromised Credentials
C) Cloud Misconfiguration
D) Malicious Insider
Answer: B
Page Ref: 17
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
5) When A Threat Succeeds In Causing Harm To A Business It Is Called A .
A) Control
B) Countermeasure
C) Compromise
D) Correctiv
e Answer: C
Page Ref: 20
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
6) Three Common Core Security Goals Are Known Collectively As
Fbi. Answer: False
Page Ref: 19
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
7) Costs For All Threats Are Increasing
Annually. Answer: False
Page Ref: 19
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
8) Corrective Countermeasures Identify When A Threat Is
Attacking. Answer: False
, Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
9) Most Countermeasure Controls Are Preventative
Controls. Answer: True
Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
10) A Happens When An Unauthorized Person Is Able To View, Alter, Or
Steal Secured Data.
A) Countermeasure
B) Data Breach
C) Safeguard
D) Compromis
e Answer: B
Page Ref: 22
Learning Objective: 1.2 Describe The Impact Of Data Breaches
Difficulty: Easy
11) In 2022, Records Were Stolen.
A) About 10 Million
B) Nearly 5 Billion
C) More Than 20 Billion
D) Almost 50
Billion Answer: C
Page Ref: 22
Learning Objective: 1.2 Describe The Impact Of Data Breaches
Difficulty: Moderate
12) Ibm Found That Percent Of Organizations Have Had More Than One
Data Breach.
A) 17
B) 25
C) 61
D) 83
Corporate Cybersecurity
By Randall J Boyle, Raymond R. Panko
6th Edition
,Test Bank For
Corporate Cybersecurity, 6th Edition Randall J Boyle Raymond R. Panko
All Chapters
Corporate Computer Security, 6e (Boyle/Panko)
Chapter 1 The Threat Environment
1) The Process Of Protecting Computer Hardware, Networks, Data, And Applications
From Attackers Is Called .
A) Cybersecurity
B) The Threat Environment
C) A Data Breach
D) A
Countermeasure
Answer: A
Page Ref: 16
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
2) If An Attacker Breaks Into A Corporate Database And Deletes Critical Files, This
Is An Attack Against The Security Goal.
A) Confidentiality
B) Integrity
C) Availability
D) Cia
Answer: B
Page Ref: 20
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
3) Which Of The Following Is A Type Of Countermeasure?
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
,Difficulty: Moderate
4) The Most Common Type Of Attack Appears To Be .
A) Phishing
B) Compromised Credentials
C) Cloud Misconfiguration
D) Malicious Insider
Answer: B
Page Ref: 17
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
5) When A Threat Succeeds In Causing Harm To A Business It Is Called A .
A) Control
B) Countermeasure
C) Compromise
D) Correctiv
e Answer: C
Page Ref: 20
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
6) Three Common Core Security Goals Are Known Collectively As
Fbi. Answer: False
Page Ref: 19
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
7) Costs For All Threats Are Increasing
Annually. Answer: False
Page Ref: 19
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
8) Corrective Countermeasures Identify When A Threat Is
Attacking. Answer: False
, Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
9) Most Countermeasure Controls Are Preventative
Controls. Answer: True
Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
10) A Happens When An Unauthorized Person Is Able To View, Alter, Or
Steal Secured Data.
A) Countermeasure
B) Data Breach
C) Safeguard
D) Compromis
e Answer: B
Page Ref: 22
Learning Objective: 1.2 Describe The Impact Of Data Breaches
Difficulty: Easy
11) In 2022, Records Were Stolen.
A) About 10 Million
B) Nearly 5 Billion
C) More Than 20 Billion
D) Almost 50
Billion Answer: C
Page Ref: 22
Learning Objective: 1.2 Describe The Impact Of Data Breaches
Difficulty: Moderate
12) Ibm Found That Percent Of Organizations Have Had More Than One
Data Breach.
A) 17
B) 25
C) 61
D) 83