) | Questions and Verified Answers
| 100 out of 100 | Grade A
Preventative countermeasures keep attacks from succeeding.
True or False
True
When a threat succeeds in causing harm to a business, this is a(n) ________.
-countermeasure
-breach
-Both breach and countermeasure
-Neither breach nor countermeasure
breach
Detective countermeasures keep attacks from succeeding.
True or False
False
, ITN 266 MIDTERM CH1 -5 (Latest Update
) | Questions and Verified Answers
| 100 out of 100 | Grade A
When a threat succeeds in causing harm to a business, this is called a ________.
-All of these
-compromise
-incident
-breach
-All of these
Confidentiality means that attackers cannot change or destroy information.
True or False
False
Which of the following are types of countermeasures?
-Detective
-Corrective
-All of these
-Preventative
All of these
, ITN 266 MIDTERM CH1 -5 (Latest Update
) | Questions and Verified Answers
| 100 out of 100 | Grade A
Most countermeasure controls are preventative controls.
True or False
True
Preventative countermeasures identify when a threat is attacking and especially
when it is succeeding.
True or False
False
Threat environment consists of the types of attackers and attacks that companies
face.
True or False
True
Most countermeasure controls are detective controls.
True or False
False
, ITN 266 MIDTERM CH1 -5 (Latest Update
) | Questions and Verified Answers
| 100 out of 100 | Grade A
Which of the following is a type of countermeasure?
-Detective
-Corrective
-Neither Detective nor Corrective
-Both Detective and Corrective
Both Detective and Corrective
If an attacker breaks into a corporate database and deletes critical files, this is a
attack against the ________ security goal.
confidentiality
Integrity
Both integrity and confidentiality
Neither integrity nor confidentiality