1
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
,TEST BANK FOR Xt Xt
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
Xt Xt Xt Xt Xt Xt Xt Xt Xt
All Chapters
Xt
Corporate Computer Security, 6e (Boyle/Panko) C Xt Xt Xt Xt Xt
hapter 1 The Threat Environment
Xt Xt Xt Xt
1) The process of protecting computer hardware, networks, data, and applications fro
Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt
m attackers is called
Xt . Xt Xt Xt
A) cybersecurity
B) the threat environment Xt Xt
C) a data breach Xt Xt
D) a countermeasure Xt
Answer: A
Xt Xt
Page Ref: 16 Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
2) If an attacker breaks into a corporate database and deletes critical files, this is a
Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt
n attack against the
Xt security goal. Xt Xt Xt Xt
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag Xt Xt
e Ref: 20
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
3) Which of the following is a type of countermeasure?
Xt Xt Xt Xt Xt Xt Xt Xt
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
Xt Xt
Page Ref: 21 Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
2
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
,4) The most common type of attack appears to be
Xt Xt Xt Xt Xt Xt Xt Xt Xt .
A) phishing
B) compromised credentials Xt
C) cloud misconfiguration Xt
D) malicious insider Xt
Answer: B
Xt Xt
Page Ref: 17
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
5) When a threat succeeds in causing harm to a business it is called a
Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pa
Xt Xt X t
ge Ref: 20
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
6) Three common core security goals are known collectively as FBI
Xt Xt Xt Xt Xt Xt Xt Xt Xt
. Answer: FALSE
Xt Xt
Page Ref: 19
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
7) Costs for all threats are increasing annually.
Xt Xt Xt Xt Xt Xt
Answer: FALSE
Xt Xt
Page Ref: 19
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
8) Corrective countermeasures identify when a threat is attacking.
Xt Xt Xt Xt Xt Xt Xt
Answer: FALSE
Xt Xt
Page Ref: 21
Xt Xt
3
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
, Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
9) Most countermeasure controls are preventative controls.
Xt Xt Xt Xt Xt
Answer: TRUE
Xt Xt
Page Ref: 21
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
10) A Xt
happens when an unauthorized person is able to view, alter, or stea Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt
l secured data.
Xt Xt
A) countermeasure
B) data breach Xt
C) safeguard
D) compromise
Xt Answer: B Xt
Page Ref: 22
Xt Xt
Learning Objective: 1.2 Describe the impact of data breaches
Xt Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
11) In 2022, Xt records were stolen.
Xt Xt Xt
A) about 10 million Xt Xt
B) nearly 5 billion Xt Xt
C) more than 20 billion Xt Xt Xt
D) almost 50 billion Xt Xt X
Answer: C
t Xt
Page Ref: 22
Xt Xt
Learning Objective: 1.2 Describe the impact of data breaches
Xt Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
12) IBM found that Xt Xt Xt
percent of organizations have had more than one data
Xt Xt Xt Xt Xt Xt Xt Xt
breach.
Xt
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
,TEST BANK FOR Xt Xt
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
Xt Xt Xt Xt Xt Xt Xt Xt Xt
All Chapters
Xt
Corporate Computer Security, 6e (Boyle/Panko) C Xt Xt Xt Xt Xt
hapter 1 The Threat Environment
Xt Xt Xt Xt
1) The process of protecting computer hardware, networks, data, and applications fro
Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt
m attackers is called
Xt . Xt Xt Xt
A) cybersecurity
B) the threat environment Xt Xt
C) a data breach Xt Xt
D) a countermeasure Xt
Answer: A
Xt Xt
Page Ref: 16 Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
2) If an attacker breaks into a corporate database and deletes critical files, this is a
Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt
n attack against the
Xt security goal. Xt Xt Xt Xt
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B Pag Xt Xt
e Ref: 20
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
3) Which of the following is a type of countermeasure?
Xt Xt Xt Xt Xt Xt Xt Xt
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
Xt Xt
Page Ref: 21 Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
2
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
,4) The most common type of attack appears to be
Xt Xt Xt Xt Xt Xt Xt Xt Xt .
A) phishing
B) compromised credentials Xt
C) cloud misconfiguration Xt
D) malicious insider Xt
Answer: B
Xt Xt
Page Ref: 17
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
5) When a threat succeeds in causing harm to a business it is called a
Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C Pa
Xt Xt X t
ge Ref: 20
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
6) Three common core security goals are known collectively as FBI
Xt Xt Xt Xt Xt Xt Xt Xt Xt
. Answer: FALSE
Xt Xt
Page Ref: 19
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
7) Costs for all threats are increasing annually.
Xt Xt Xt Xt Xt Xt
Answer: FALSE
Xt Xt
Page Ref: 19
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
8) Corrective countermeasures identify when a threat is attacking.
Xt Xt Xt Xt Xt Xt Xt
Answer: FALSE
Xt Xt
Page Ref: 21
Xt Xt
3
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt
, Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
9) Most countermeasure controls are preventative controls.
Xt Xt Xt Xt Xt
Answer: TRUE
Xt Xt
Page Ref: 21
Xt Xt
Learning Objective: 1.1 Define the term threat environment
Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
10) A Xt
happens when an unauthorized person is able to view, alter, or stea Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt Xt
l secured data.
Xt Xt
A) countermeasure
B) data breach Xt
C) safeguard
D) compromise
Xt Answer: B Xt
Page Ref: 22
Xt Xt
Learning Objective: 1.2 Describe the impact of data breaches
Xt Xt Xt Xt Xt Xt Xt Xt
Difficulty: Easy Xt
11) In 2022, Xt records were stolen.
Xt Xt Xt
A) about 10 million Xt Xt
B) nearly 5 billion Xt Xt
C) more than 20 billion Xt Xt Xt
D) almost 50 billion Xt Xt X
Answer: C
t Xt
Page Ref: 22
Xt Xt
Learning Objective: 1.2 Describe the impact of data breaches
Xt Xt Xt Xt Xt Xt Xt Xt
Difficulty: Moderate Xt
12) IBM found that Xt Xt Xt
percent of organizations have had more than one data
Xt Xt Xt Xt Xt Xt Xt Xt
breach.
Xt
A) 17
B) 25
C) 61
4
Copyright © 2025 Pearson Education, Inc.
Xt Xt Xt Xt Xt