Copyright © 2025 Pearson Education, In
@ @ @ @ @
c.
,TEST BANK FOR @ @
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
@ @ @ @ @ @ @ @ @
All Chapters
@
Corporate Computer Security, 6e (Boyle/Panko
@ @ @ @
) Chapter 1 The Threat Environment
@ @ @ @ @
1) The process of protecting computer hardware, networks, data, and applications fro
@ @ @ @ @ @ @ @ @ @
m attackers is called
@ . @ @
A) cybersecurity
B) the threat environment@ @
C) a data breach @ @
D) a countermeasur
@
e Answer: A
@ @
Page Ref: 16@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Easy @
2) If an attacker breaks into a corporate database and deletes critical files, this is
@ @ @ @ @ @ @ @ @ @ @ @ @ @
an attack against the
@ security goal.
@ @ @
A) confidentiality
B) integrity
C) availability
D) CIA A @
nswer: B Pa @ @
ge Ref: 20
@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Moderate @
3) Which of the following is a type of countermeasure?
@ @ @ @ @ @ @ @
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
@ @
Page Ref: 21@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Moderate @
2
Copyright © 2025 Pearson Education, In
@ @ @ @ @
c.
,4) The most common type of attack appears to be
@ @ @ @ @ @ @ @ .
A) phishing
B) compromised credentials @
C) cloud misconfiguration @
D) malicious inside @
r Answer: B
@ @
Page Ref: 17
@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Easy @
5) When a threat succeeds in causing harm to a business it is called a
@ @ @ @ @ @ @ @ @ @ @ @ @ .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pag
@ @ @
e Ref: 20
@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Moderate @
6) Three common core security goals are known collectively as FB
@ @ @ @ @ @ @ @ @
I. Answer: FALSE
@ @
Page Ref: 19
@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Easy @
7) Costs for all threats are increasing annuall
@ @ @ @ @ @
y. Answer: FALSE
@ @
Page Ref: 19
@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Easy @
8) Corrective countermeasures identify when a threat is attackin
@ @ @ @ @ @ @
g. Answer: FALSE
@ @
Page Ref: 21
@ @
3
Copyright © 2025 Pearson Education, In
@ @ @ @ @
c.
, Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Easy @
9) Most countermeasure controls are preventative controls
@ @ @ @ @
. Answer: TRUE
@ @
Page Ref: 21
@ @
Learning Objective: 1.1 Define the term threat environment
@ @ @ @ @ @ @
Difficulty: Easy @
10) A
happens when an unauthorized person is able to view, alter, or steal secured d
@ @ @ @ @ @ @ @ @ @ @ @ @
ata.
A) countermeasure
B) data breach @
C) safeguard
D) compromise
Answer: B
@ @
Page Ref: 22
@ @
Learning Objective: 1.2 Describe the impact of data breaches
@ @ @ @ @ @ @ @
Difficulty: Easy @
11) In 2022,@ records were stolen. @ @
A) about 10 million @ @
B) nearly 5 billion @ @
C) more than 20 billion @ @ @
D) almost 50 billio @ @
n Answer: C
@ @
Page Ref: 22
@ @
Learning Objective: 1.2 Describe the impact of data breaches
@ @ @ @ @ @ @ @
Difficulty: Moderate@
12) IBM found that
@ @
percent of organizations have had more than one data breach.
@ @ @ @ @ @ @ @ @
A) 17
B) 25
C) 61
D) 83
4
Copyright © 2025 Pearson Education, In
@ @ @ @ @
c.