1
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
,TEST BANK FOR cn cn
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
cn cn cn cn cn cn cn cn cn
All Chapters
cn
Corporate Computer Security, 6e (Boyle/Panko) Ch
cn cn cn cn cn
apter 1 The Threat Environment
cn cn cn cn
1) The process of protecting computer hardware, networks, data, and applications from
cn cn cn cn cn cn cn cn cn cn cn
attackers is called . cn cn cn
A) cybersecurity
B) the threat environment cn cn
C) a data breach cn cn
D) a countermeasure cn c
n Answer: A cn
Page Ref: 16 cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
2) If an attacker breaks into a corporate database and deletes critical files, this is an
cn cn cn cn cn cn cn cn cn cn cn cn cn cn cn
attack against the security goal.
cn cn cn cn
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag cn cn
e Ref: 20
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Moderate cn
3) Which of the following is a type of countermeasure?
cn cn cn cn cn cn cn cn
A) Ethical
B) Invisible
C) Detective
D) Sustainable c
Answer: C
n cn
Page Ref: 21 cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Moderate cn
2
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
,4) The most common type of attack appears to be
cn cn cn cn cn cn cn cn cn .
A) phishing
B) compromised credentials cn
C) cloud misconfiguration cn
D) malicious insider cn c
n Answer: B cn
Page Ref: 17
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
5) When a threat succeeds in causing harm to a business it is called a
cn cn cn cn cn cn cn cn cn cn cn cn cn cn .
A) control
B) countermeasure
C) compromise
D) corrective
cn Answer: C Pa cn c n
ge Ref: 20
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Moderate cn
6) Three common core security goals are known collectively as FBI.
cn cn cn cn cn cn cn cn cn cn
Answer: FALSE cn
Page Ref: 19
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
7) Costs for all threats are increasing annually.
cn cn cn cn cn cn cn
Answer: FALSE cn
Page Ref: 19
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
8) Corrective countermeasures identify when a threat is attacking.
cn cn cn cn cn cn cn cn
Answer: FALSE cn
Page Ref: 21
cn cn
3
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
, Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
9) Most countermeasure controls are preventative controls.
cn cn cn cn cn cn
Answer: TRUE cn
Page Ref: 21
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
10) A cn
happens when an unauthorized person is able to view, alter, or steal cn cn cn cn cn cn cn cn cn cn cn cn
secured data. cn
A) countermeasure
B) data breach cn
C) safeguard
D) compromise
Answer: B
cn cn
Page Ref: 22
cn cn
Learning Objective: 1.2 Describe the impact of data breaches
cn cn cn cn cn cn cn cn
Difficulty: Easy cn
11) In 2022,
cn records were stolen.
cn cn cn
A) about 10 million cn cn
B) nearly 5 billion cn cn
C) more than 20 billion cn cn cn
D) almost 50 billion cn cn cn
Answer: C cn
Page Ref: 22
cn cn
Learning Objective: 1.2 Describe the impact of data breaches
cn cn cn cn cn cn cn cn
Difficulty: Moderate cn
12) IBM found that cn cn cn
percent of organizations have had more than one data
cn cn cn cn cn cn cn cn cn
breach.
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
,TEST BANK FOR cn cn
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
cn cn cn cn cn cn cn cn cn
All Chapters
cn
Corporate Computer Security, 6e (Boyle/Panko) Ch
cn cn cn cn cn
apter 1 The Threat Environment
cn cn cn cn
1) The process of protecting computer hardware, networks, data, and applications from
cn cn cn cn cn cn cn cn cn cn cn
attackers is called . cn cn cn
A) cybersecurity
B) the threat environment cn cn
C) a data breach cn cn
D) a countermeasure cn c
n Answer: A cn
Page Ref: 16 cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
2) If an attacker breaks into a corporate database and deletes critical files, this is an
cn cn cn cn cn cn cn cn cn cn cn cn cn cn cn
attack against the security goal.
cn cn cn cn
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag cn cn
e Ref: 20
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Moderate cn
3) Which of the following is a type of countermeasure?
cn cn cn cn cn cn cn cn
A) Ethical
B) Invisible
C) Detective
D) Sustainable c
Answer: C
n cn
Page Ref: 21 cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Moderate cn
2
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
,4) The most common type of attack appears to be
cn cn cn cn cn cn cn cn cn .
A) phishing
B) compromised credentials cn
C) cloud misconfiguration cn
D) malicious insider cn c
n Answer: B cn
Page Ref: 17
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
5) When a threat succeeds in causing harm to a business it is called a
cn cn cn cn cn cn cn cn cn cn cn cn cn cn .
A) control
B) countermeasure
C) compromise
D) corrective
cn Answer: C Pa cn c n
ge Ref: 20
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Moderate cn
6) Three common core security goals are known collectively as FBI.
cn cn cn cn cn cn cn cn cn cn
Answer: FALSE cn
Page Ref: 19
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
7) Costs for all threats are increasing annually.
cn cn cn cn cn cn cn
Answer: FALSE cn
Page Ref: 19
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
8) Corrective countermeasures identify when a threat is attacking.
cn cn cn cn cn cn cn cn
Answer: FALSE cn
Page Ref: 21
cn cn
3
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn
, Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
9) Most countermeasure controls are preventative controls.
cn cn cn cn cn cn
Answer: TRUE cn
Page Ref: 21
cn cn
Learning Objective: 1.1 Define the term threat environment
cn cn cn cn cn cn cn
Difficulty: Easy cn
10) A cn
happens when an unauthorized person is able to view, alter, or steal cn cn cn cn cn cn cn cn cn cn cn cn
secured data. cn
A) countermeasure
B) data breach cn
C) safeguard
D) compromise
Answer: B
cn cn
Page Ref: 22
cn cn
Learning Objective: 1.2 Describe the impact of data breaches
cn cn cn cn cn cn cn cn
Difficulty: Easy cn
11) In 2022,
cn records were stolen.
cn cn cn
A) about 10 million cn cn
B) nearly 5 billion cn cn
C) more than 20 billion cn cn cn
D) almost 50 billion cn cn cn
Answer: C cn
Page Ref: 22
cn cn
Learning Objective: 1.2 Describe the impact of data breaches
cn cn cn cn cn cn cn cn
Difficulty: Moderate cn
12) IBM found that cn cn cn
percent of organizations have had more than one data
cn cn cn cn cn cn cn cn cn
breach.
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
cn cn cn cn cn