1
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
,Corporate Computer Security, 6e (Boyle/Panko)
RF RF RF RF RF
Chapter 1 The Threat Environment
RF RF RF RF
1) The process of protecting computer hardware, networks, data, and applications fr
RF RF RF RF RF RF RF RF RF RF
om attackers is called
RF . RF RF RF
A) cybersecurity
B) the threat environment RF RF
C) a data breach RF RF
D) a countermeasur RF
e Answer: A
RF RF
Page Ref: 16 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
2) If an attacker breaks into a corporate database and deletes critical files, this i
RF RF RF RF RF RF RF RF RF RF RF RF RF
s an attack against the
RF RF security goal. RF RF RF RF
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pa RF RF
ge Ref: 20RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Moderate RF
3) Which of the following is a type of countermeasure?
RF RF RF RF RF RF RF RF
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
RF RF
Page Ref: 21 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Moderate RF
2
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
,4) The most common type of attack appears to be
RF RF RF RF RF RF RF RF RF .
A) phishing
B) compromised credentials RF
C) cloud misconfiguration RF
D) malicious insider RF
RF Answer: B RF
Page Ref: 17 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
5) When a threat succeeds in causing harm to a business it is called a
RF RF RF RF RF RF RF RF RF RF RF RF RF RF .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C P
RF RF R F
age Ref: 20 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Moderate RF
6) Three common core security goals are known collectively as F
RF RF RF RF RF RF RF RF RF
BI. Answer: FALSE
RF RF
Page Ref: 19 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
7) Costs for all threats are increasing annuall
RF RF RF RF RF RF
y. Answer: FALSE
RF RF
Page Ref: 19 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
8) Corrective countermeasures identify when a threat is attackin
RF RF RF RF RF RF RF
g. Answer: FALSE
RF RF
Page Ref: 21 RF RF
3
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
, Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
9) Most countermeasure controls are preventative control
RF RF RF RF RF
s. Answer: TRUE
RF RF
Page Ref: 21
RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
10) A RF
happens when an unauthorized person is able to view, alter, or s
RF RF RF RF RF RF RF RF RF RF RF
teal secured data.
RF RF
A) countermeasure
B) data breach RF
C) safeguard
D) compromise
Answer: B
RF RF
Page Ref: 22
RF RF
Learning Objective: 1.2 Describe the impact of data breaches
RF RF RF RF RF RF RF RF
Difficulty: Easy RF
11) In 2022, RF records were stolen.
RF RF RF
A) about 10 million RF RF
B) nearly 5 billion RF RF
C) more than 20 billion RF RF RF
D) almost 50 billio RF RF
n Answer: C
RF RF
Page Ref: 22
RF RF
Learning Objective: 1.2 Describe the impact of data breaches
RF RF RF RF RF RF RF RF
Difficulty: Moderate RF
12) IBM found that RF RF RF
percent of organizations have had more than one d
RF RF RF RF RF RF RF RF
ata breach.
RF
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
,Corporate Computer Security, 6e (Boyle/Panko)
RF RF RF RF RF
Chapter 1 The Threat Environment
RF RF RF RF
1) The process of protecting computer hardware, networks, data, and applications fr
RF RF RF RF RF RF RF RF RF RF
om attackers is called
RF . RF RF RF
A) cybersecurity
B) the threat environment RF RF
C) a data breach RF RF
D) a countermeasur RF
e Answer: A
RF RF
Page Ref: 16 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
2) If an attacker breaks into a corporate database and deletes critical files, this i
RF RF RF RF RF RF RF RF RF RF RF RF RF
s an attack against the
RF RF security goal. RF RF RF RF
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pa RF RF
ge Ref: 20RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Moderate RF
3) Which of the following is a type of countermeasure?
RF RF RF RF RF RF RF RF
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
RF RF
Page Ref: 21 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Moderate RF
2
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
,4) The most common type of attack appears to be
RF RF RF RF RF RF RF RF RF .
A) phishing
B) compromised credentials RF
C) cloud misconfiguration RF
D) malicious insider RF
RF Answer: B RF
Page Ref: 17 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
5) When a threat succeeds in causing harm to a business it is called a
RF RF RF RF RF RF RF RF RF RF RF RF RF RF .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C P
RF RF R F
age Ref: 20 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Moderate RF
6) Three common core security goals are known collectively as F
RF RF RF RF RF RF RF RF RF
BI. Answer: FALSE
RF RF
Page Ref: 19 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
7) Costs for all threats are increasing annuall
RF RF RF RF RF RF
y. Answer: FALSE
RF RF
Page Ref: 19 RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
8) Corrective countermeasures identify when a threat is attackin
RF RF RF RF RF RF RF
g. Answer: FALSE
RF RF
Page Ref: 21 RF RF
3
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.
, Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
9) Most countermeasure controls are preventative control
RF RF RF RF RF
s. Answer: TRUE
RF RF
Page Ref: 21
RF RF
Learning Objective: 1.1 Define the term threat environment
RF RF RF RF RF RF RF
Difficulty: Easy RF
10) A RF
happens when an unauthorized person is able to view, alter, or s
RF RF RF RF RF RF RF RF RF RF RF
teal secured data.
RF RF
A) countermeasure
B) data breach RF
C) safeguard
D) compromise
Answer: B
RF RF
Page Ref: 22
RF RF
Learning Objective: 1.2 Describe the impact of data breaches
RF RF RF RF RF RF RF RF
Difficulty: Easy RF
11) In 2022, RF records were stolen.
RF RF RF
A) about 10 million RF RF
B) nearly 5 billion RF RF
C) more than 20 billion RF RF RF
D) almost 50 billio RF RF
n Answer: C
RF RF
Page Ref: 22
RF RF
Learning Objective: 1.2 Describe the impact of data breaches
RF RF RF RF RF RF RF RF
Difficulty: Moderate RF
12) IBM found that RF RF RF
percent of organizations have had more than one d
RF RF RF RF RF RF RF RF
ata breach.
RF
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, In
RF RF RF RF RF
c.