TEST BANK FOR
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
All Chapters
Corporate Computer Security, 6e (Boyle/Panko)
Chapter 1 The Threat Environment
1) The process of protecting computer hardware, networks, data, and applications from
attackers is called .
A) cybersecurity
B) the threat environment
C) a data breach
D) a countermeasure
M
Answer: A
Page Ref: 16
ED
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
2) If an attacker breaks into a corporate database and deletes critical files, this is an
ST
attack against the security goal.
A) confidentiality
B) integrity
C) availability
D) CIA
U
Answer: B
Page Ref: 20
D
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
Y
3) Which of the following is a type of countermeasure?
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
Page Ref: 21
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
,MEDSTUDY.COM
4) The most common type of attack appears to be .
A) phishing
B) compromised credentials
C) cloud misconfiguration
D) malicious insider
Answer: B
Page Ref: 17
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
5) When a threat succeeds in causing harm to a business it is called a .
M
A) control
B) countermeasure
C) compromise
ED
D) corrective
Answer: C
Page Ref: 20
Learning Objective: 1.1 Define the term threat environment
ST
Difficulty: Moderate
6) Three common core security goals are known collectively as FBI.
Answer: FALSE
U
Page Ref: 19
Learning Objective: 1.1 Define the term threat environment
D
Difficulty: Easy
Y
7) Costs for all threats are increasing annually.
Answer: FALSE
Page Ref: 19
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
8) Corrective countermeasures identify when a threat is attacking.
Answer: FALSE
Page Ref: 21
,MEDSTUDY.COM
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
9) Most countermeasure controls are preventative controls.
Answer: TRUE
Page Ref: 21
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
M
10) A happens when an unauthorized person is able to view, alter, or steal
secured data.
A) countermeasure
B) data breach
ED
C) safeguard
D) compromise
Answer: B
Page Ref: 22
ST
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy
11) In 2022, records were stolen.
U
A) about 10 million
B) nearly 5 billion
D
C) more than 20 billion
D) almost 50 billion
Answer: C
Y
Page Ref: 22
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Moderate
12) IBM found that percent of organizations have had more than one data
breach.
A) 17
B) 25
C) 61
D) 83
, MEDSTUDY.COM
Answer: D
Page Ref: 23
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy
13) Which of the following is a direct cost of a data breach?
A) Loss of reputation
B) Abnormal customer turnover
C) Legal fees
D) Increased customer acquisition activities
Answer: C
M
Page Ref: 23
Learning Objective: 1.2 Describe the impact of data breaches
ED
Difficulty: Moderate
14) Which of the following is NOT a direct cost of a major data breach?
A) Loss of reputation
ST
B) Notification costs
C) Legal fees
D) Detection
Answer: A
U
Page Ref: 23
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Moderate
D
Difficulty: Easy
Y
15) More than 67 percent of data breaches come from hackers .
A) trying to make money
B) engaging in industrial espionage
C) getting personal revenge
D) making a social statement
Answer: A
Page Ref: 24
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy