1
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
,TEST BANK FOR OK OK
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
OK OK OK OK OK OK OK OK OK
All Chapters
OK
Corporate Computer Security, 6e (Boyle/Panko)
OK OK OK OK OK
Chapter 1 The Threat Environment
OK OK OK OK
1) The process of protecting computer hardware, networks, data, and applications f
OK OK OK OK OK OK OK OK OK OK
rom attackers is calledOK . OK OK OK
A) cybersecurity
B) the threat environment OK OK
C) a data breach OK OK
D) a countermeasur OK
e Answer: A
OK OK
Page Ref: 16 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
2) If an attacker breaks into a corporate database and deletes critical files, this
OK OK OK OK OK OK OK OK OK OK OK OK
is an attack against the security goal.
OK OK OK OK OK OK OK
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pa OK OK
ge Ref: 20OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Moderate OK
3) Which of the following is a type of countermeasure?
OK OK OK OK OK OK OK OK
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
OK OK
Page Ref: 21 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Moderate OK
2
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
,4) The most common type of attack appears to be
OK OK OK OK OK OK OK OK OK .
A) phishing
B) compromised credentials OK
C) cloud misconfiguration OK
D) malicious inside OK
r Answer: B
OK OK
Page Ref: 17 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
5) When a threat succeeds in causing harm to a business it is called a
OK OK OK OK OK OK OK OK OK OK OK OK OK OK .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C P
OK OK O K
age Ref: 20OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Moderate OK
6) Three common core security goals are known collectively as
OK OK OK OK OK OK OK OK OK
FBI. Answer: FALSE
OK OK
Page Ref: 19 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
7) Costs for all threats are increasing annual
OK OK OK OK OK OK
ly. Answer: FALSE
OK OK
Page Ref: 19 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
8) Corrective countermeasures identify when a threat is attacki
OK OK OK OK OK OK OK
ng. Answer: FALSE
OK OK
Page Ref: 21 OK OK
3
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
, Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
9) Most countermeasure controls are preventative control
OK OK OK OK OK
s. Answer: TRUE
OK OK
Page Ref: 21
OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
10) A OK
happens when an unauthorized person is able to view, alter, or
OK OK OK OK OK OK OK OK OK OK OK
steal secured data.
OK OK
A) countermeasure
B) data breach OK
C) safeguard
D) compromise
Answer: B
OK OK
Page Ref: 22
OK OK
Learning Objective: 1.2 Describe the impact of data breaches
OK OK OK OK OK OK OK OK
Difficulty: Easy OK
11) In 2022, OK records were stolen.
OK OK OK
A) about 10 million OK OK
B) nearly 5 billion OK OK
C) more than 20 billion OK OK OK
D) almost 50 billio OK OK
n Answer: C
OK OK
Page Ref: 22
OK OK
Learning Objective: 1.2 Describe the impact of data breaches
OK OK OK OK OK OK OK OK
Difficulty: Moderate OK
12) IBM found that OK OK OK
percent of organizations have had more than one d
OK OK OK OK OK OK OK OK
ata breach.
OK
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
,TEST BANK FOR OK OK
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
OK OK OK OK OK OK OK OK OK
All Chapters
OK
Corporate Computer Security, 6e (Boyle/Panko)
OK OK OK OK OK
Chapter 1 The Threat Environment
OK OK OK OK
1) The process of protecting computer hardware, networks, data, and applications f
OK OK OK OK OK OK OK OK OK OK
rom attackers is calledOK . OK OK OK
A) cybersecurity
B) the threat environment OK OK
C) a data breach OK OK
D) a countermeasur OK
e Answer: A
OK OK
Page Ref: 16 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
2) If an attacker breaks into a corporate database and deletes critical files, this
OK OK OK OK OK OK OK OK OK OK OK OK
is an attack against the security goal.
OK OK OK OK OK OK OK
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pa OK OK
ge Ref: 20OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Moderate OK
3) Which of the following is a type of countermeasure?
OK OK OK OK OK OK OK OK
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
OK OK
Page Ref: 21 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Moderate OK
2
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
,4) The most common type of attack appears to be
OK OK OK OK OK OK OK OK OK .
A) phishing
B) compromised credentials OK
C) cloud misconfiguration OK
D) malicious inside OK
r Answer: B
OK OK
Page Ref: 17 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
5) When a threat succeeds in causing harm to a business it is called a
OK OK OK OK OK OK OK OK OK OK OK OK OK OK .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C P
OK OK O K
age Ref: 20OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Moderate OK
6) Three common core security goals are known collectively as
OK OK OK OK OK OK OK OK OK
FBI. Answer: FALSE
OK OK
Page Ref: 19 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
7) Costs for all threats are increasing annual
OK OK OK OK OK OK
ly. Answer: FALSE
OK OK
Page Ref: 19 OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
8) Corrective countermeasures identify when a threat is attacki
OK OK OK OK OK OK OK
ng. Answer: FALSE
OK OK
Page Ref: 21 OK OK
3
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.
, Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
9) Most countermeasure controls are preventative control
OK OK OK OK OK
s. Answer: TRUE
OK OK
Page Ref: 21
OK OK
Learning Objective: 1.1 Define the term threat environment
OK OK OK OK OK OK OK
Difficulty: Easy OK
10) A OK
happens when an unauthorized person is able to view, alter, or
OK OK OK OK OK OK OK OK OK OK OK
steal secured data.
OK OK
A) countermeasure
B) data breach OK
C) safeguard
D) compromise
Answer: B
OK OK
Page Ref: 22
OK OK
Learning Objective: 1.2 Describe the impact of data breaches
OK OK OK OK OK OK OK OK
Difficulty: Easy OK
11) In 2022, OK records were stolen.
OK OK OK
A) about 10 million OK OK
B) nearly 5 billion OK OK
C) more than 20 billion OK OK OK
D) almost 50 billio OK OK
n Answer: C
OK OK
Page Ref: 22
OK OK
Learning Objective: 1.2 Describe the impact of data breaches
OK OK OK OK OK OK OK OK
Difficulty: Moderate OK
12) IBM found that OK OK OK
percent of organizations have had more than one d
OK OK OK OK OK OK OK OK
ata breach.
OK
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, I
OK OK OK OK OK
nc.