TEST BANK FOR Corporate Cybersecurity, 6th edition by Randall J Boyle, Raymond R.
Panko ISBN: 978-0135339299 COMPLETE GUIDE ALL CHAPTERS COVERED 100%
VERIFIED A+ GRADE ASSURED!!!!!NEW LATEST UPDATE!!!!!
1
Copyright © 2025 Pearson Education, Inc.
n n n n n
,TEST BANK FOR n n
Corporate Computer Security, 6e (Boyle/Panko)
n n n n
Chapter 1 The Threat Environment
n n n n n
1) The process of protecting computer hardware, networks, data, and applications from
n n n n n n n n n n
attackers is called
n . n n n
A) cybersecurity
B) the threat environment n n
C) a data breach n n
D) a countermeasure
n
Answer: A
n n
Page Ref: 16n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
2) If an attacker breaks into a corporate database and deletes critical files, this is an
n n n n n n n n n n n n n n
attack against the
n security goal.
n n n n
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B n
Page Ref: 20
n n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Moderate n
3) Which of the following is a type of countermeasure?
n n n n n n n n
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
n n
Page Ref: 21n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Moderate n
2
Copyright © 2025 Pearson Education, Inc.
n n n n n
,4) The most common type of attack appears to be
n n n n n n n n n .
A) phishing
B) compromised credentials n
C) cloud misconfiguration n
D) malicious insider n
Answer: B
n n
Page Ref: 17
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
5) When a threat succeeds in causing harm to a business it is called a
n n n n n n n n n n n n n n .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C
n n
n Page Ref: 20
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Moderate n
6) Three common core security goals are known collectively as FBI.
n n n n n n n n n
Answer: FALSE
n n
Page Ref: 19
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
7) Costs for all threats are increasing annually.
n n n n n n
Answer: FALSE
n n
Page Ref: 19
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
8) Corrective countermeasures identify when a threat is attacking.
n n n n n n n
Answer: FALSE
n n
Page Ref: 21
n n
3
Copyright © 2025 Pearson Education, Inc.
n n n n n
, Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
9) Most countermeasure controls are preventative controls.
n n n n n
Answer: TRUE
n n
Page Ref: 21
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
10) A n happens when an unauthorized person is able to view, alter, or steal n n n n n n n n n n n
secured data.
n n
A) countermeasure
B) data breach n
C) safeguard
D) compromise
Answer: B
n n
Page Ref: 22
n n
Learning Objective: 1.2 Describe the impact of data breaches
n n n n n n n n
Difficulty: Easy n
11) In 2022, n records were stolen.
n n n
A) about 10 million n n
B) nearly 5 billion n n
C) more than 20 billion n n n
D) almost 50 billion n n
Answer: C
n n
Page Ref: 22
n n
Learning Objective: 1.2 Describe the impact of data breaches
n n n n n n n n
Difficulty: Moderate n
12) IBM found that n n n percent of organizations have had more than one data
n n n n n n n n
breach.
n
A) 17
B) 25
C) 61
D) 83
4
Copyright © 2025 Pearson Education, Inc.
n n n n n
Panko ISBN: 978-0135339299 COMPLETE GUIDE ALL CHAPTERS COVERED 100%
VERIFIED A+ GRADE ASSURED!!!!!NEW LATEST UPDATE!!!!!
1
Copyright © 2025 Pearson Education, Inc.
n n n n n
,TEST BANK FOR n n
Corporate Computer Security, 6e (Boyle/Panko)
n n n n
Chapter 1 The Threat Environment
n n n n n
1) The process of protecting computer hardware, networks, data, and applications from
n n n n n n n n n n
attackers is called
n . n n n
A) cybersecurity
B) the threat environment n n
C) a data breach n n
D) a countermeasure
n
Answer: A
n n
Page Ref: 16n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
2) If an attacker breaks into a corporate database and deletes critical files, this is an
n n n n n n n n n n n n n n
attack against the
n security goal.
n n n n
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B n
Page Ref: 20
n n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Moderate n
3) Which of the following is a type of countermeasure?
n n n n n n n n
A) Ethical
B) Invisible
C) Detective
D) Sustainable
Answer: C
n n
Page Ref: 21n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Moderate n
2
Copyright © 2025 Pearson Education, Inc.
n n n n n
,4) The most common type of attack appears to be
n n n n n n n n n .
A) phishing
B) compromised credentials n
C) cloud misconfiguration n
D) malicious insider n
Answer: B
n n
Page Ref: 17
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
5) When a threat succeeds in causing harm to a business it is called a
n n n n n n n n n n n n n n .
A) control
B) countermeasure
C) compromise
D) corrective
Answer: C
n n
n Page Ref: 20
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Moderate n
6) Three common core security goals are known collectively as FBI.
n n n n n n n n n
Answer: FALSE
n n
Page Ref: 19
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
7) Costs for all threats are increasing annually.
n n n n n n
Answer: FALSE
n n
Page Ref: 19
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
8) Corrective countermeasures identify when a threat is attacking.
n n n n n n n
Answer: FALSE
n n
Page Ref: 21
n n
3
Copyright © 2025 Pearson Education, Inc.
n n n n n
, Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
9) Most countermeasure controls are preventative controls.
n n n n n
Answer: TRUE
n n
Page Ref: 21
n n
Learning Objective: 1.1 Define the term threat environment
n n n n n n n
Difficulty: Easy n
10) A n happens when an unauthorized person is able to view, alter, or steal n n n n n n n n n n n
secured data.
n n
A) countermeasure
B) data breach n
C) safeguard
D) compromise
Answer: B
n n
Page Ref: 22
n n
Learning Objective: 1.2 Describe the impact of data breaches
n n n n n n n n
Difficulty: Easy n
11) In 2022, n records were stolen.
n n n
A) about 10 million n n
B) nearly 5 billion n n
C) more than 20 billion n n n
D) almost 50 billion n n
Answer: C
n n
Page Ref: 22
n n
Learning Objective: 1.2 Describe the impact of data breaches
n n n n n n n n
Difficulty: Moderate n
12) IBM found that n n n percent of organizations have had more than one data
n n n n n n n n
breach.
n
A) 17
B) 25
C) 61
D) 83
4
Copyright © 2025 Pearson Education, Inc.
n n n n n