TEST BANK
Corporate Cybersecurity [Print Replica] 6th Kindle
Edition
by Randall Boyle (Author), Raymond Panko (Author)
,TABLE OF CONTENTS
The Threat Environment
Planning and Policy
Cryptography
Secure Networks
Access Control
Firewalls
Host Hardening
Application Security
Data Protection
Incident and Disaster Response
Module A: Networking Concepts
,Corporate Cybersecurity, 6th Edition Randall J Boyle Raymond R.
Panko
Corporate Computer Security, 6e
(Boyle/Panko)
Chapter 1 The Threat Environment
Multiple Choice Questions
1) The Process Of Protecting Computer Hardware, Networks, Data, And Applications
From Attackers Is Called .
A) Cybersecurity
B) The Threat Environment
C) A Data Breach
D) A
Countermeasure
Correct Answer; A
Page Ref: 16
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
2) If An Attacker Breaks Into A Corporate Database And Deletes Critical Files, This
Is An Attack Against The Security Goal.
A) Confidentiality
B) Integrity
C) Availability
D) CIA
Correct
Answer; B
Page Ref: 20
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
3) Which Of The Following Is A Type Of Countermeasure?
A) Ethical
B) Invisible
C) Detective
, D) Sustainable
Correct Answer;
C
Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
Corporate Cybersecurity [Print Replica] 6th Kindle
Edition
by Randall Boyle (Author), Raymond Panko (Author)
,TABLE OF CONTENTS
The Threat Environment
Planning and Policy
Cryptography
Secure Networks
Access Control
Firewalls
Host Hardening
Application Security
Data Protection
Incident and Disaster Response
Module A: Networking Concepts
,Corporate Cybersecurity, 6th Edition Randall J Boyle Raymond R.
Panko
Corporate Computer Security, 6e
(Boyle/Panko)
Chapter 1 The Threat Environment
Multiple Choice Questions
1) The Process Of Protecting Computer Hardware, Networks, Data, And Applications
From Attackers Is Called .
A) Cybersecurity
B) The Threat Environment
C) A Data Breach
D) A
Countermeasure
Correct Answer; A
Page Ref: 16
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Easy
2) If An Attacker Breaks Into A Corporate Database And Deletes Critical Files, This
Is An Attack Against The Security Goal.
A) Confidentiality
B) Integrity
C) Availability
D) CIA
Correct
Answer; B
Page Ref: 20
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate
3) Which Of The Following Is A Type Of Countermeasure?
A) Ethical
B) Invisible
C) Detective
, D) Sustainable
Correct Answer;
C
Page Ref: 21
Learning Objective: 1.1 Define The Term Threat Environment
Difficulty: Moderate