CERTIFIED-IN-CYBERSECURITY · Question #230
CERTIFIED-IN-CYBERSECURITY Question #230: Real Exam Question with Answer & Explanation
The correct answer is D: A potential source of harm to a system. A threat is a potential source of harm to a system (see ISC2 Study Guide, Chapter 1, Module 1). Threats can manifest in various ways including a malicious actor like a hacker, a computer virus, or even a natural disaster such as a hurricane or earthquake. In contrast, a computer
Question
What is a threat?
Options
- AA computer code that has a flaw that can cause a critical incident.
- BAn asset needs protection
- CA gap in a fence
- DA potential source of harm to a system
Explanation
A threat is a potential source of harm to a system (see ISC2 Study Guide, Chapter 1, Module 1). Threats can manifest in various ways including a malicious actor like a hacker, a computer virus, or even a natural disaster such as a hurricane or earthquake. In contrast, a computer code that contains a flaw resulting in a potential critical incident characterizes a vulnerability, not a threat. Similarly, a gap in a fence could be considered a vulnerability in physical security, not a threat itself. Lastly, while an asset certainly requires protection, this doesn't define a threat; rather, it underscores the need for protective measures to counter potential threats.
Topics
Community Discussion
No community discussion yet for this question.