1
Copyright © 2025 Pearson Education, Inc.
zl zl zl zl zl
,TEST BANK FOR zl zl
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
zl zl zl zl zl zl zl zl zl
All Chapters
zl
Corporate Computer Security, 6e (Boyle/Panko) Ch zl zl zl zl zl
apter 1 The Threat Environment
zl zl zl zl
1) The process of protecting computer hardware, networks, data, and applications from att
zl zl zl zl zl zl zl zl zl zl zl
ackers is called . zl zl zl
A) cybersecurity
B) the threat environment zl zl
C) a data breach zl zl
D) a countermeasure zl zl
Answer: A zl
Page Ref: 16 zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
2) If an attacker breaks into a corporate database and deletes critical files, this is an att
zl zl zl zl zl zl zl zl zl zl zl zl zl zl zl
ack against the zl security goal. zl zl zl
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag zl zl
e Ref: 20
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Moderate zl
3) Which of the following is a type of countermeasure?
zl zl zl zl zl zl zl zl
A) Ethical
B) Invisible
C) Detective
D) Sustainable z
Answer: C
l zl
Page Ref: 21 zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Moderate zl
2
Copyright © 2025 Pearson Education, Inc.zl zl zl zl zl
,4) The most common type of attack appears to be
zl zl zl zl zl zl zl zl zl .
A) phishing
B) compromised credentials zl
C) cloud misconfiguration zl
D) malicious insider zl zl
Answer: B zl
Page Ref: 17
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
5) When a threat succeeds in causing harm to a business it is called a
zl zl zl zl zl zl zl zl zl zl zl zl zl zl .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pag
zl zl z l
e Ref: 20
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Moderate zl
6) Three common core security goals are known collectively as FBI. A
zl zl zl zl zl zl zl zl zl zl
nswer: FALSE zl
Page Ref: 19
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
7) Costs for all threats are increasing annually. A
zl zl zl zl zl zl zl
nswer: FALSE zl
Page Ref: 19
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
8) Corrective countermeasures identify when a threat is attacking. A
zl zl zl zl zl zl zl zl
nswer: FALSE zl
Page Ref: 21
zl zl
3
Copyright © 2025 Pearson Education, Inc.
zl zl zl zl zl
, Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
9) Most countermeasure controls are preventative controls.
zl zl zl zl zl zl
Answer: TRUE zl
Page Ref: 21
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
10) A zl
happens when an unauthorized person is able to view, alter, or steal se zl zl zl zl zl zl zl zl zl zl zl zl
cured data. zl
A) countermeasure
B) data breach zl
C) safeguard
D) compromise
Answer: B
zl zl
Page Ref: 22
zl zl
Learning Objective: 1.2 Describe the impact of data breaches
zl zl zl zl zl zl zl zl
Difficulty: Easy zl
11) In 2022,
zl records were stolen.
zl zl zl
A) about 10 million zl zl
B) nearly 5 billion zl zl
C) more than 20 billion zl zl zl
D) almost 50 billion zl zl zl
Answer: C zl
Page Ref: 22
zl zl
Learning Objective: 1.2 Describe the impact of data breaches
zl zl zl zl zl zl zl zl
Difficulty: Moderate zl
12) IBM found that zl zl zl
percent of organizations have had more than one data br
zl zl zl zl zl zl zl zl zl
each.
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
zl zl zl zl zl
Copyright © 2025 Pearson Education, Inc.
zl zl zl zl zl
,TEST BANK FOR zl zl
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
zl zl zl zl zl zl zl zl zl
All Chapters
zl
Corporate Computer Security, 6e (Boyle/Panko) Ch zl zl zl zl zl
apter 1 The Threat Environment
zl zl zl zl
1) The process of protecting computer hardware, networks, data, and applications from att
zl zl zl zl zl zl zl zl zl zl zl
ackers is called . zl zl zl
A) cybersecurity
B) the threat environment zl zl
C) a data breach zl zl
D) a countermeasure zl zl
Answer: A zl
Page Ref: 16 zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
2) If an attacker breaks into a corporate database and deletes critical files, this is an att
zl zl zl zl zl zl zl zl zl zl zl zl zl zl zl
ack against the zl security goal. zl zl zl
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag zl zl
e Ref: 20
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Moderate zl
3) Which of the following is a type of countermeasure?
zl zl zl zl zl zl zl zl
A) Ethical
B) Invisible
C) Detective
D) Sustainable z
Answer: C
l zl
Page Ref: 21 zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Moderate zl
2
Copyright © 2025 Pearson Education, Inc.zl zl zl zl zl
,4) The most common type of attack appears to be
zl zl zl zl zl zl zl zl zl .
A) phishing
B) compromised credentials zl
C) cloud misconfiguration zl
D) malicious insider zl zl
Answer: B zl
Page Ref: 17
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
5) When a threat succeeds in causing harm to a business it is called a
zl zl zl zl zl zl zl zl zl zl zl zl zl zl .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pag
zl zl z l
e Ref: 20
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Moderate zl
6) Three common core security goals are known collectively as FBI. A
zl zl zl zl zl zl zl zl zl zl
nswer: FALSE zl
Page Ref: 19
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
7) Costs for all threats are increasing annually. A
zl zl zl zl zl zl zl
nswer: FALSE zl
Page Ref: 19
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
8) Corrective countermeasures identify when a threat is attacking. A
zl zl zl zl zl zl zl zl
nswer: FALSE zl
Page Ref: 21
zl zl
3
Copyright © 2025 Pearson Education, Inc.
zl zl zl zl zl
, Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
9) Most countermeasure controls are preventative controls.
zl zl zl zl zl zl
Answer: TRUE zl
Page Ref: 21
zl zl
Learning Objective: 1.1 Define the term threat environment
zl zl zl zl zl zl zl
Difficulty: Easy zl
10) A zl
happens when an unauthorized person is able to view, alter, or steal se zl zl zl zl zl zl zl zl zl zl zl zl
cured data. zl
A) countermeasure
B) data breach zl
C) safeguard
D) compromise
Answer: B
zl zl
Page Ref: 22
zl zl
Learning Objective: 1.2 Describe the impact of data breaches
zl zl zl zl zl zl zl zl
Difficulty: Easy zl
11) In 2022,
zl records were stolen.
zl zl zl
A) about 10 million zl zl
B) nearly 5 billion zl zl
C) more than 20 billion zl zl zl
D) almost 50 billion zl zl zl
Answer: C zl
Page Ref: 22
zl zl
Learning Objective: 1.2 Describe the impact of data breaches
zl zl zl zl zl zl zl zl
Difficulty: Moderate zl
12) IBM found that zl zl zl
percent of organizations have had more than one data br
zl zl zl zl zl zl zl zl zl
each.
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
zl zl zl zl zl