Corporate Cybersecurity
6th Edition
TEST BANK
Randall J. Boyle
Raymond R. Panko
────────────────────────────────────────────────────
Comprehensive Test Bank for Instructors
and Students
© Randall J. Boyle & Raymond R. Panko. All rights
reserved. Reproduction or distribution without
permission is prohibited.
||| ||| || ||| || | || ||| | || ||| |
9780135335734
© Medgeek
, Edrftgyihu jiuh
Test Bank — Corporate Cybersecurity, 6th Edition — Boyle and
Panko
Description
This test bank corresponds to the 6th edition of Corporate
Cybersecurity by Randall J. Boyle and Raymond R. Panko. It follows
the official textbook structure and supports assessment of
organizational cybersecurity principles, threat analysis, security
planning, network and application security, data protection, and
incident response.
Table of Contents
Chapter 1: The Threat Environment
Chapter 2: Planning and Policy
Chapter 3: Cryptography
Chapter 4: Secure Networks
Chapter 5: Access Control
Chapter 6: Firewalls
Chapter 7: Host Hardening
Chapter 8: Application Security
Chapter 9: Data Protection
Chapter 10: Incident and Disaster Response
© Medgeek
,Test Bank for
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
All Chapters
Corporate Computer Security, 6e (Boyle/Panko)
Chapter 1 The Threat Environment
1) The process of protecting computer hardware, networks, data, and applications from
attackers is called .
A) cybersecurity
B) the threat environment
C) a data breach
D) a countermeasure
Answer: A
Page Ref: 16
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
2) If an attacker breaks into a corporate database and deletes critical files, this is an
attack against the security goal.
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B
Page Ref: 20
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
3) Which of the following is a type of countermeasure?
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
Page Ref: 21
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
1
Copyright © 2025 Pearson Education, Inc.
, 4) The most common type of attack appears to be .
A) phishing
B) compromised credentials
C) cloud misconfiguration
D) malicious insider
Answer: B
Page Ref: 17
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
5) When a threat succeeds in causing harm to a business it is called a .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C
Page Ref: 20
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
6) Three common core security goals are known collectively as FBI.
Answer: FALSE
Page Ref: 19
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
7) Costs for all threats are increasing annually.
Answer: FALSE
Page Ref: 19
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
8) Corrective countermeasures identify when a threat is attacking.
Answer: FALSE
Page Ref: 21
2
Copyright © 2025 Pearson Education, Inc.