100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Corporate Computer Security 5th Edition, by Randall J Boyle and Raymond R. Panko -All 10 Chapters | TEST BANK $29.72
Add to cart

Other

Corporate Computer Security 5th Edition, by Randall J Boyle and Raymond R. Panko -All 10 Chapters | TEST BANK

 5 purchases
  • Course
  • Corporate Computer Security
  • Institution
  • Corporate Computer Security

TEST BANK for Corporate Computer Security 5th Edition, by Randall J Boyle and Raymond R. Panko ISBN-13 978-4. All 10 Chapters. (Complete Download). 247 Pages TABLE OF CONTNETS Page : 1 Chapter 1 The Threat Environment Page : 24 Chapter 2 Planning and Policy Page : 47 Chapter 3 Cryptography Page : ...

[Show more]

Preview 4 out of 247  pages

  • January 4, 2023
  • 247
  • 2022/2023
  • Other
  • Unknown
book image

Book Title:

Author(s):

  • Edition:
  • ISBN:
  • Edition:
  • Corporate Computer Security
  • Corporate Computer Security
avatar-seller
AcademiContent
,Corporate Computer Security, 5e (Boyle/Panko)
Chapter 1 The Threat Environment

1) The three common core goals of security are ________.
A) confidentiality, information, and authorization
B) confidentiality, integrity, and authentication
C) confidentiality, information, and availability
D) confidentiality, integrity, and availability
Answer: D
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

2) If an attacker breaks into a corporate database and deletes critical files, this is an attack against
the ________ security goal.
A) confidentiality
B) integrity
C) availability
D) CIA
Answer: B
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

3) Which of the following is NOT a type of countermeasure?
A) Corrective
B) Preventative
C) Detective
D) Sustainable
Answer: D
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

4) When a threat succeeds in causing harm to a business, this is known as a(n) ________.
A) breach
B) PII
C) CIA
D) unintended access
Answer: A
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy




1
Copyright © 2021 Pearson Education, Inc.

,5) Methods that security professionals use to try to stop threats include all of the following
EXCEPT ________.
A) safeguards
B) countermeasure
C) protections
D) breaches
Answer: D
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

6) Which of the following is NOT a type of countermeasure?
A) Detective
B) Corrective
C) Cyberwar
D) Preventative
Answer: C
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

7) The cost of computer crime is well known.
Answer: FALSE
Page Ref: 2
Learning Objective: 1.1 Define the term threat environment
Difficulty: Moderate

8) Availability means that attackers cannot change or destroy information.
Answer: FALSE
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

9) Costs for all threats is increasing annually.
Answer: TRUE
Page Ref: 3
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

10) Corrective countermeasures identify when a threat is attacking.
Answer: FALSE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy




2
Copyright © 2021 Pearson Education, Inc.

, 11) Preventative countermeasures keep attacks from succeeding.
Answer: TRUE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

12) Detective countermeasures is considered one of the security goals of computer staff.
Answer: FALSE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

13) Most countermeasure controls are preventative controls.
Answer: TRUE
Page Ref: 4
Learning Objective: 1.1 Define the term threat environment
Difficulty: Easy

14) A ________ happens when an unauthorized person is able to view, alter, or steal secured
data.
A) countermeasure
B) data breach
C) safeguard
D) compromise
Answer: B
Page Ref: 5
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy

15) More than ________ records were stolen in 2018.
A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
Answer: C
Page Ref: 5
Learning Objective: 1.2 Describe the impact of data breaches
Difficulty: Easy




3
Copyright © 2021 Pearson Education, Inc.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AcademiContent. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $29.72. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

68175 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$29.72  5x  sold
  • (0)
Add to cart
Added