Chapter 1 The Threat Environment
1) The three common core goals of security are ________.
A) confidentiality, information, and authorization
B) confidentiality, integrity, and authentication
C) confidentiality, information, and availability
D) confidentiality, integrity, and availability
Answer: D
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
2) If an attacker breaks into a corporate database and deletes critical files, this is an attack against
the ________ security goal.
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
3) Which of the following is NOT a type of countermeasure?
A) Corrective
B) Preventative
C) Detective
D) Sustainable
Answer: D
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
4) When a threat succeeds in causing harm to a business, this is known as a(n) ________.
A) breach
B) PII
C) CIA
D) unintended access
Answer: A
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
1
Copyright © 2021 Pearson Education, Inc.
,5) Methods that security professionals use to try to stop threats include all of the following
EXCEPT ________.
A) safeguards
B) countermeasure
C) protections
D) breaches
Answer: D
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
6) Which of the following is NOT a type of countermeasure?
A) Detective
B) Corrective
C) Cyberwar
D) Preventative
Answer: C
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
7) The cost of computer crime is well known.
Answer: FALSE
Page Ref: 2
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate
8) Availability means that attackers cannot change or destroy information.
Answer: FALSE
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
9) Costs for all threats is increasing annually.
Answer: TRUE
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
10) Corrective countermeasures identify when a threat is attacking.
Answer: FALSE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
2
Copyright © 2021 Pearson Education, Inc.
, 11) Preventative countermeasures keep attacks from succeeding.
Answer: TRUE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
12) Detective countermeasures is considered one of the security goals of computer staff.
Answer: FALSE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
13) Most countermeasure controls are preventative controls.
Answer: TRUE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy
14) A ________ happens when an unauthorized person is able to view, alter, or steal secured
data.
A) countermeasure
B) data breach
C) safeguard
D) compromise
Answer: B
Page Ref: 5
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy
15) More than ________ records were stolen in 2018.
A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
Answer: C
Page Ref: 5
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy
3
Copyright © 2021 Pearson Education, Inc.