Chapter 1 The Threat Environment
1) Threat environment consists of the types of attackers and attacks that companies face.
Answer: TRUE
Diff: 1
2) Confidentiality means that attackers cannot change or destroy information.
Answer: FALSE
Diff: 1
3) The three common core goals of security are ________.
A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization
Answer: A
Diff: 1
Question: 1b
4) If an attacker breaks into a corporate database and deletes critical files, this is a attack
against the ________ security goal.
A) integrity
B) confidentiality
C) Both A and B
,D) Neither A nor B
Answer: A
Diff: 3
Question: T1
5) Which of the following are types of countermeasures?
A) Preventative
B) Detective
C) Corrective
D) All of the above
Answer: D
Diff: 3
6) When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
B) compromise
C) incident
D) All of the above
Answer: D
Diff: 1
Question: 1d
7) When a threat succeeds in causing harm to a business, this is a(n) ________.
A) breach
B) countermeasure
C) Both A and B
,D) Neither A nor B
Answer: A
Diff: 1
Question: 1d
8) Another name for safeguard is ________.
A) countermeasure
B) compromise
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 1
Question: 1g
9) Which of the following is a type of countermeasure?
A) Detective
B) Corrective
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 1i
10) Preventative countermeasures identify when a threat is attacking and especially when
it is succeeding.
, Answer: FALSE
Diff: 2
11) Detective countermeasures identify when a threat is attacking and especially when it
is succeeding.
Answer: TRUE
Diff: 2
12) Detective countermeasures keep attacks from succeeding.
Answer: FALSE
Diff: 2
13) Preventative countermeasures keep attacks from succeeding.
Answer: TRUE
Diff: 2