Corporate Computer Security
By Randall Boyle, Raymond Panko
6th Edition
1
Copyright © 2025 Pearson Education, Inc.
,Test Bank For
Corporate Cybersecurity, 6th Edition Randall J Boyle Raymond R. Panko
All Chapters
Corporate computer security, 6e (boyle/panko)
chapter 1 the threat environment
1) The process of protecting computer hardware, networks, data, and applications from
attackers is called .
A) Cybersecurity
B) The threat environment
C) A data breach
D) A
countermeasure
Answer: a
Page ref: 16
Learning objective: 1.1 define the term threat environment
Difficulty: easy
2) If an attacker breaks into a corporate database and deletes critical files, this is an
attack against the security goal.
A) Confidentiality
B) Integrity
C) Availability
D) Cia
Answer: b
page ref: 20
Learning objective: 1.1 define the term threat environment
Difficulty: moderate
3) Which of the following is a type of countermeasure?
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: c
Page ref: 21
Learning objective: 1.1 define the term threat environment
2
Copyright © 2025 Pearson Education, Inc.
,Difficulty: moderate
4) The most common type of attack appears to be .
A) Phishing
B) Compromised credentials
C) Cloud misconfiguration
D) Malicious insider
Answer: b
Page ref: 17
Learning objective: 1.1 define the term threat environment
Difficulty: easy
5) When a threat succeeds in causing harm to a business it is called a .
A) Control
B) Countermeasure
C) Compromise
D) Correctiv
e Answer: c
page ref: 20
Learning objective: 1.1 define the term threat environment
Difficulty: moderate
6) Three common core security goals are known collectively as fbi.
Answer: false
Page ref: 19
Learning objective: 1.1 define the term threat environment
Difficulty: easy
7) Costs for all threats are increasing annually.
Answer: false
Page ref: 19
Learning objective: 1.1 define the term threat environment
Difficulty: easy
8) Corrective countermeasures identify when a threat is attacking.
Answer: false
3
Copyright © 2025 Pearson Education, Inc.
, Page ref: 21
Learning objective: 1.1 define the term threat environment
Difficulty: easy
9) Most countermeasure controls are preventative controls.
Answer: true
Page ref: 21
Learning objective: 1.1 define the term threat environment
Difficulty: easy
10) A happens when an unauthorized person is able to view, alter, or steal
secured data.
A) Countermeasure
B) Data breach
C) Safeguard
D) Compromis
e Answer: b
Page ref: 22
Learning objective: 1.2 describe the impact of data breaches
Difficulty: easy
11) In 2022, records were stolen.
A) About 10 million
B) Nearly 5 billion
C) More than 20 billion
D) Almost 50 billion
Answer: c
Page ref: 22
Learning objective: 1.2 describe the impact of data breaches
Difficulty: moderate
12) Ibm found that percent of organizations have had more than one data
breach.
A) 17
B) 25
C) 61
D) 83
4
Copyright © 2025 Pearson Education, Inc.