Answers 100% Pass
Threat environment consists of the types of attackers and attacks that companies face.
T/F - ✔✔TRUE
2) Confidentiality means that attackers cannot change or destroy information.
T/F - ✔✔FALSE
3) The three common core goals of security are ________.
A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization - ✔✔A
4) If an attacker breaks into a corporate database and deletes critical files, this is a attack
against the ________ security goal.
A) integrity
B) confidentiality
Brittie Donald, All Rights Reserved © 2025 1
,C) Both A and B
D) Neither A nor B - ✔✔A
5) Which of the following are types of countermeasures?
A) Preventative
B) Detective
C) Corrective
D) All of the above - ✔✔D
6) When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
B) compromise
C) incident
D) All of the above - ✔✔D
7) When a threat succeeds in causing harm to a business, this is a(n) ________.
A) breach
B) countermeasure
C) Both A and B
Brittie Donald, All Rights Reserved © 2025 2
, D) Neither A nor B - ✔✔A
8) Another name for safeguard is ________.
A) countermeasure
B) compromise
C) Both A and B
D) Neither A nor B - ✔✔A
9) Which of the following is a type of countermeasure?
A) Detective
B) Corrective
C) Both A and B
D) Neither A nor B - ✔✔C
10) Preventative countermeasures identify when a threat is attacking and especially
when it is succeeding.
T/F - ✔✔FALSE
11) Detective countermeasures identify when a threat is attacking and especially when
it is succeeding. - ✔✔TRUE
12) Detective countermeasures keep attacks from succeeding. - ✔✔FALSE
Brittie Donald, All Rights Reserved © 2025 3