nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #229

CERTIFIED-IN-CYBERSECURITY Question #229: Real Exam Question with Answer & Explanation

The correct answer is C: A software company developing a malware detection system. A software company developing a malware detection system is not considered a threat actor. Threat actors are entities that exploit vulnerabilities for malicious purposes (see ISC2 Study Guide, Chapter 1, Module 1). In contrast, a software company creating a malware detection syst

Security Principles

Question

Which of the following is NOT considered a threat actor?

Options

  • AA competing business engaging in corporate espionage
  • BCyberterrorism
  • CA software company developing a malware detection system
  • DNation-states

Explanation

A software company developing a malware detection system is not considered a threat actor. Threat actors are entities that exploit vulnerabilities for malicious purposes (see ISC2 Study Guide, Chapter 1, Module 1). In contrast, a software company creating a malware detection system is working to enhance cybersecurity. For instance, companies like Norton or McAfee develop antivirus software to identify and neutralize cyber threats, making them part of the cybersecurity solution, not a threat actor. The other options are incorrect as they are all considered threat actors. Nation-states can engage in cyber warfare, using digital means to disrupt or damage the infrastructure of other countries. A competing business engaging in corporate espionage could steal sensitive information for competitive advantage. Cyberterrorism refers to the use of the internet to conduct violent acts that threaten or cause harm in pursuit of political or ideological goals. All these entities are involved in activities that pose a threat to cybersecurity, making them threat actors.

Topics

#Threat Actors#Cybersecurity Fundamentals#Threat Intelligence#Adversary Types

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions