1
Copyright © 2025 Pearson Education, Inc.
x x x x x
,TEST BANK FOR x x
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
x x x x x x x x x
All Chapters
x
Corporate Computer Security, 6e (Boyle/Panko) x x x x x
Chapter 1 The Threat Environment x x x x
1) The process of protecting computer hardware, networks, data, and applications fromatt
x x x x x x x x x x x
ackers is called . x x
A) cybersecurity
B) the threat environment x x
C) a data breach x x
D) a countermeasure x x
Answer: A x
Page Ref: 16 x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
2) If an attacker breaks into a corporate database and deletes critical files, this is anatt
x x x x x x x x x x x x x x x
ack against the x security goal. x x
A) confidentiality
B) integrity
C) availability
D) CIA A x
nswer: B Pag x x
e Ref: 20
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Moderate x
3) Which of the following is a type of countermeasure?
x x x x x x x x
A) Ethical
B) Invisible
C) Detective
D) Sustainable x
Answer: C x
Page Ref: 21 x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Moderate x
2
Copyright © 2025 Pearson Education, Inc.
x x x x x
,4) The most common type of attack appears to be
x x x x x x x x .
A) phishing
B) compromised credentials x
C) cloud misconfiguration x
D) malicious insider x x
Answer: B x
Page Ref: 17
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
5) When a threat succeeds in causing harm to a business it is called a
x x x x x x x x x x x x x .
A) control
B) countermeasure
C) compromise
D) corrective x
Answer: C Pag x x
e Ref: 20
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Moderate x
6) Three common core security goals are known collectively as FBI.A
x x x x x x x x x x
nswer: FALSE x
Page Ref: 19
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
7) Costs for all threats are increasing annually.A
x x x x x x x
nswer: FALSE x
Page Ref: 19
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
8) Corrective countermeasures identify when a threat is attacking.A
x x x x x x x x
nswer: FALSE x
Page Ref: 21
x x
3
Copyright © 2025 Pearson Education, Inc.
x x x x x
, Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
9) Most countermeasure controls are preventative controls.
x x x x x x
Answer: TRUE x
Page Ref: 21
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
10) A
happens when an unauthorized person is able to view, alter, or stealsecured data.
x x x x x x x x x x x x x
A) countermeasure
B) data breach x
C) safeguard
D) compromise x
Answer: B x
Page Ref: 22
x x
Learning Objective: 1.2 Describe the impact of data breaches
x x x x x x x x
Difficulty: Easy x
11) In 2022,
x records were stolen. x x
A) about 10 million x x
B) nearly 5 billion x x
C) more than 20 billion x x x
D) almost 50 billion x x x
Answer: C x
Page Ref: 22
x x
Learning Objective: 1.2 Describe the impact of data breaches
x x x x x x x x
Difficulty: Moderate
x
12) IBM found that
x x
percent of organizations have had more than one databreach.
x x x x x x x x x
A) 17
B) 25
C) 61
D) 83
4
Copyright © 2025 Pearson Education, Inc.
x x x x x
Copyright © 2025 Pearson Education, Inc.
x x x x x
,TEST BANK FOR x x
Corporate Cybersecurity, 6th edition Randall J Boyle Raymond R. Panko
x x x x x x x x x
All Chapters
x
Corporate Computer Security, 6e (Boyle/Panko) x x x x x
Chapter 1 The Threat Environment x x x x
1) The process of protecting computer hardware, networks, data, and applications fromatt
x x x x x x x x x x x
ackers is called . x x
A) cybersecurity
B) the threat environment x x
C) a data breach x x
D) a countermeasure x x
Answer: A x
Page Ref: 16 x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
2) If an attacker breaks into a corporate database and deletes critical files, this is anatt
x x x x x x x x x x x x x x x
ack against the x security goal. x x
A) confidentiality
B) integrity
C) availability
D) CIA A x
nswer: B Pag x x
e Ref: 20
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Moderate x
3) Which of the following is a type of countermeasure?
x x x x x x x x
A) Ethical
B) Invisible
C) Detective
D) Sustainable x
Answer: C x
Page Ref: 21 x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Moderate x
2
Copyright © 2025 Pearson Education, Inc.
x x x x x
,4) The most common type of attack appears to be
x x x x x x x x .
A) phishing
B) compromised credentials x
C) cloud misconfiguration x
D) malicious insider x x
Answer: B x
Page Ref: 17
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
5) When a threat succeeds in causing harm to a business it is called a
x x x x x x x x x x x x x .
A) control
B) countermeasure
C) compromise
D) corrective x
Answer: C Pag x x
e Ref: 20
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Moderate x
6) Three common core security goals are known collectively as FBI.A
x x x x x x x x x x
nswer: FALSE x
Page Ref: 19
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
7) Costs for all threats are increasing annually.A
x x x x x x x
nswer: FALSE x
Page Ref: 19
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
8) Corrective countermeasures identify when a threat is attacking.A
x x x x x x x x
nswer: FALSE x
Page Ref: 21
x x
3
Copyright © 2025 Pearson Education, Inc.
x x x x x
, Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
9) Most countermeasure controls are preventative controls.
x x x x x x
Answer: TRUE x
Page Ref: 21
x x
Learning Objective: 1.1 Define the term threat environment
x x x x x x x
Difficulty: Easy x
10) A
happens when an unauthorized person is able to view, alter, or stealsecured data.
x x x x x x x x x x x x x
A) countermeasure
B) data breach x
C) safeguard
D) compromise x
Answer: B x
Page Ref: 22
x x
Learning Objective: 1.2 Describe the impact of data breaches
x x x x x x x x
Difficulty: Easy x
11) In 2022,
x records were stolen. x x
A) about 10 million x x
B) nearly 5 billion x x
C) more than 20 billion x x x
D) almost 50 billion x x x
Answer: C x
Page Ref: 22
x x
Learning Objective: 1.2 Describe the impact of data breaches
x x x x x x x x
Difficulty: Moderate
x
12) IBM found that
x x
percent of organizations have had more than one databreach.
x x x x x x x x x
A) 17
B) 25
C) 61
D) 83
4
Copyright © 2025 Pearson Education, Inc.
x x x x x