Test Bank for Corporate Computer Security, 5th Edition

Study stress-free with Test Bank for Corporate Computer Security, 5th Edition, a concise and easy-to-follow exam guide tailored for success.

Jack Murphy
Contributor
4.7
31
2 days ago
Preview (16 of 246)
Sign in to access the full document!
1
Corporate Computer Security, 5e (Boyle/Panko)

Chapter 1 The Threat Environment

1) The three common core goals of security are ________.

A) confidentiality, information, and authorization

B) confidentiality, integrity, and authentication

C) confidentiality, information, and availability

D) confidentiality, integrity, and availability

Answer: D

Page Ref: 3

Learning Objective: 1.1 Define the term threat environment

Difficulty: Moderate

2) If an attacker breaks into a corporate database and deletes critical files, this is an attack against
the ________ security goal.

A) confidentiality

B) integrity

C) availability

D) CIA

Answer: B

Page Ref: 3

Learning Objective: 1.1 Define the term threat environment

Difficulty: Moderate

3) Which of the following is NOT a type of countermeasure?

A) Corrective

B) Preventative

C) Detective

D) Sustainable

Answer: D

Page Ref: 4

Learning Objective: 1.1 Define the term threat environment

Difficulty: Moderate

4) When a threat succeeds in causing harm to a business, this is known as a(n) ________.

A) breach

B) PII

C) CIA

D) unintended access

Answer: A

Page Ref: 4

Learning Objective: 1.1 Define the term threat environment

Difficulty: Easy
2
5) Methods that security professionals use to try to stop threats include all of the following
EXCEPT ________.

A) safeguards

B) countermeasure

C) protections

D) breaches

Answer: D

Page Ref: 3

Learning Objective: 1.1 Define the term threat environment

Difficulty: Moderate

6) Which of the following is NOT a type of countermeasure?

A) Detective

B) Corrective

C) Cyberwar

D) Preventative

Answer: C

Page Ref: 4

Learning Objective: 1.1 Define the term threat environment

Difficulty: Easy

7) The cost of computer crime is well known.

Answer: FALSE

Page Ref: 2

Learning Objective: 1.1 Define the term threat environment

Difficulty: Moderate

8) Availability means that attackers cannot change or destroy information.

Answer: FALSE

Page Ref: 3

Learning Objective: 1.1 Define the term threat environment

Difficulty: Easy

9) Costs for all threats is increasing annually.

Answer: TRUE

Page Ref: 3

Learning Objective: 1.1 Define the term threat environment

Difficulty: Easy

10) Corrective countermeasures identify when a threat is attacking.

Answer: FALSE

Page Ref: 4

Learning Objective: 1.1 Define the term threat environment

Difficulty: Easy

Loading page 6...

Loading page 7...

Loading page 8...

Loading page 9...

Loading page 10...

Loading page 11...

Loading page 12...

Loading page 13...

Loading page 14...

Loading page 15...

Loading page 16...

13 more pages available. Scroll down to load them.

Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Subject
Information Technology