nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #230

CERTIFIED-IN-CYBERSECURITY Question #230: Real Exam Question with Answer & Explanation

The correct answer is D: A potential source of harm to a system. A threat is a potential source of harm to a system (see ISC2 Study Guide, Chapter 1, Module 1). Threats can manifest in various ways including a malicious actor like a hacker, a computer virus, or even a natural disaster such as a hurricane or earthquake. In contrast, a computer

Security Principles

Question

What is a threat?

Options

  • AA computer code that has a flaw that can cause a critical incident.
  • BAn asset needs protection
  • CA gap in a fence
  • DA potential source of harm to a system

Explanation

A threat is a potential source of harm to a system (see ISC2 Study Guide, Chapter 1, Module 1). Threats can manifest in various ways including a malicious actor like a hacker, a computer virus, or even a natural disaster such as a hurricane or earthquake. In contrast, a computer code that contains a flaw resulting in a potential critical incident characterizes a vulnerability, not a threat. Similarly, a gap in a fence could be considered a vulnerability in physical security, not a threat itself. Lastly, while an asset certainly requires protection, this doesn't define a threat; rather, it underscores the need for protective measures to counter potential threats.

Topics

#Threat Definition#Cybersecurity Fundamentals#Risk Management Basics#Security Concepts

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions