1
Copyright © 2025 Pearson Education, Inc.
dt dt dt dt dt
,Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
dt dt dt dt dt dt dt dt dt
All Chapters
dt
Corporate Computer Security, 6e (Boyle/Panko) Ch dt dt dt dt dt
apter 1 The Threat Environment
dt dt dt dt
1) The process of protecting computer hardware, networks, data, and applications from a
dt dt dt dt dt dt dt dt dt dt dt
ttackers is called . dt dt dt
A) cybersecurity
B) the threat environment dt dt
C) a data breach dt dt
D) a countermeasure dt dt
Answer: A dt
Page Ref: 16 dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
2) If an attacker breaks into a corporate database and deletes critical files, this is an at
dt dt dt dt dt dt dt dt dt dt dt dt dt dt dt
tack against the dt security goal. dt dt dt
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag dt dt
e Ref: 20
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Moderate dt
3) Which of the following is a type of countermeasure?
dt dt dt dt dt dt dt dt
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
dt dt
Page Ref: 21 dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Moderate dt
2
Copyright © 2025 Pearson Education, Inc. dt dt dt dt dt
,4) The most common type of attack appears to be
dt dt dt dt dt dt dt dt dt .
A) phishing
B) compromised credentials dt
C) cloud misconfiguration dt
D) malicious insider dt dt
Answer: B dt
Page Ref: 17
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
5) When a threat succeeds in causing harm to a business it is called a
dt dt dt dt dt dt dt dt dt dt dt dt dt dt .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pag
dt dt d t
e Ref: 20
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Moderate dt
6) Three common core security goals are known collectively as FBI. A
dt dt dt dt dt dt dt dt dt dt
nswer: FALSE dt
Page Ref: 19
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
7) Costs for all threats are increasing annually.
dt dt dt dt dt dt dt
Answer: FALSE dt
Page Ref: 19
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
8) Corrective countermeasures identify when a threat is attacking.dt dt dt dt dt dt dt dt
Answer: FALSE dt
Page Ref: 21
dt dt
3
Copyright © 2025 Pearson Education, Inc.
dt dt dt dt dt
, Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
9) Most countermeasure controls are preventative controls.
dt dt dt dt dt dt
Answer: TRUE dt
Page Ref: 21
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
10) A dt
happens when an unauthorized person is able to view, alter, or steal s dt dt dt dt dt dt dt dt dt dt dt dt
ecured data. dt
A) countermeasure
B) data breach dt
C) safeguard
D) compromise
Answer: B
dt dt
Page Ref: 22
dt dt
Learning Objective: 1.2 Describe the impact of data breaches
dt dt dt dt dt dt dt dt
Difficulty: Easy dt
11) In 2022,
dt records were stolen.
dt dt dt
A) about 10 million dt dt
B) nearly 5 billion dt dt
C) more than 20 billion dt dt dt
D) almost 50 billion dt dt dt
Answer: C dt
Page Ref: 22
dt dt
Learning Objective: 1.2 Describe the impact of data breaches
dt dt dt dt dt dt dt dt
Difficulty: Moderate dt
12) IBM found that dt dt dt
percent of organizations have had more than one data b
dt dt dt dt dt dt dt dt dt
reach.
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
dt dt dt dt dt
Copyright © 2025 Pearson Education, Inc.
dt dt dt dt dt
,Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
dt dt dt dt dt dt dt dt dt
All Chapters
dt
Corporate Computer Security, 6e (Boyle/Panko) Ch dt dt dt dt dt
apter 1 The Threat Environment
dt dt dt dt
1) The process of protecting computer hardware, networks, data, and applications from a
dt dt dt dt dt dt dt dt dt dt dt
ttackers is called . dt dt dt
A) cybersecurity
B) the threat environment dt dt
C) a data breach dt dt
D) a countermeasure dt dt
Answer: A dt
Page Ref: 16 dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
2) If an attacker breaks into a corporate database and deletes critical files, this is an at
dt dt dt dt dt dt dt dt dt dt dt dt dt dt dt
tack against the dt security goal. dt dt dt
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag dt dt
e Ref: 20
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Moderate dt
3) Which of the following is a type of countermeasure?
dt dt dt dt dt dt dt dt
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
dt dt
Page Ref: 21 dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Moderate dt
2
Copyright © 2025 Pearson Education, Inc. dt dt dt dt dt
,4) The most common type of attack appears to be
dt dt dt dt dt dt dt dt dt .
A) phishing
B) compromised credentials dt
C) cloud misconfiguration dt
D) malicious insider dt dt
Answer: B dt
Page Ref: 17
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
5) When a threat succeeds in causing harm to a business it is called a
dt dt dt dt dt dt dt dt dt dt dt dt dt dt .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pag
dt dt d t
e Ref: 20
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Moderate dt
6) Three common core security goals are known collectively as FBI. A
dt dt dt dt dt dt dt dt dt dt
nswer: FALSE dt
Page Ref: 19
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
7) Costs for all threats are increasing annually.
dt dt dt dt dt dt dt
Answer: FALSE dt
Page Ref: 19
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
8) Corrective countermeasures identify when a threat is attacking.dt dt dt dt dt dt dt dt
Answer: FALSE dt
Page Ref: 21
dt dt
3
Copyright © 2025 Pearson Education, Inc.
dt dt dt dt dt
, Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
9) Most countermeasure controls are preventative controls.
dt dt dt dt dt dt
Answer: TRUE dt
Page Ref: 21
dt dt
Learning Objective: 1.1 Define the term threat environment
dt dt dt dt dt dt dt
Difficulty: Easy dt
10) A dt
happens when an unauthorized person is able to view, alter, or steal s dt dt dt dt dt dt dt dt dt dt dt dt
ecured data. dt
A) countermeasure
B) data breach dt
C) safeguard
D) compromise
Answer: B
dt dt
Page Ref: 22
dt dt
Learning Objective: 1.2 Describe the impact of data breaches
dt dt dt dt dt dt dt dt
Difficulty: Easy dt
11) In 2022,
dt records were stolen.
dt dt dt
A) about 10 million dt dt
B) nearly 5 billion dt dt
C) more than 20 billion dt dt dt
D) almost 50 billion dt dt dt
Answer: C dt
Page Ref: 22
dt dt
Learning Objective: 1.2 Describe the impact of data breaches
dt dt dt dt dt dt dt dt
Difficulty: Moderate dt
12) IBM found that dt dt dt
percent of organizations have had more than one data b
dt dt dt dt dt dt dt dt dt
reach.
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
dt dt dt dt dt