100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Other

Test Bank For Corporate Computer Security 5th Edition

Rating
-
Sold
4
Pages
247
Uploaded on
14-10-2023
Written in
2023/2024

Test Bank For Corporate Computer Security 5th Edition

Institution
Corporate Computer Security
Course
Corporate Computer Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Corporate Computer Security
Course
Corporate Computer Security

Document information

Uploaded on
October 14, 2023
Number of pages
247
Written in
2023/2024
Type
Other
Person
Unknown

Subjects

Content preview

,Corporate Computer Security, 5e (Boyle/Panko)
Chapter 1 The Threat Environment

1) The three common core goals of security are ________.
A) confidentiality, information, and authorization
B) confidentiality, integrity, and authentication
C) confidentiality, information, and availability
D) confidentiality, integrity, and availability
Answer: D
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

2) If an attacker breaks into a corporate database and deletes critical files, this is an attack against
the ________ security goal.
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

3) Which of the following is NOT a type of countermeasure?
A) Corrective
B) Preventative
C) Detective
D) Sustainable
Answer: D
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

4) When a threat succeeds in causing harm to a business, this is known as a(n) ________.
A) breach
B) PII
C) CIA
D) unintended access
Answer: A
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy




1
Copyright © 2021 Pearson Education, Inc.

,5) Methods that security professionals use to try to stop threats include all of the following
EXCEPT ________.
A) safeguards
B) countermeasure
C) protections
D) breaches
Answer: D
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

6) Which of the following is NOT a type of countermeasure?
A) Detective
B) Corrective
C) Cyberwar
D) Preventative
Answer: C
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

7) The cost of computer crime is well known.
Answer: FALSE
Page Ref: 2
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

8) Availability means that attackers cannot change or destroy information.
Answer: FALSE
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

9) Costs for all threats is increasing annually.
Answer: TRUE
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

10) Corrective countermeasures identify when a threat is attacking.
Answer: FALSE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy




2
Copyright © 2021 Pearson Education, Inc.

, 11) Preventative countermeasures keep attacks from succeeding.
Answer: TRUE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

12) Detective countermeasures is considered one of the security goals of computer staff.
Answer: FALSE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

13) Most countermeasure controls are preventative controls.
Answer: TRUE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

14) A ________ happens when an unauthorized person is able to view, alter, or steal secured
data.
A) countermeasure
B) data breach
C) safeguard
D) compromise
Answer: B
Page Ref: 5
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy

15) More than ________ records were stolen in 2018.
A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
Answer: C
Page Ref: 5
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy




3
Copyright © 2021 Pearson Education, Inc.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AdvancedLevelExpert Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
116
Member since
3 year
Number of followers
66
Documents
538
Last sold
13 hours ago

4.1

22 reviews

5
11
4
7
3
2
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions