nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #337

CERTIFIED-IN-CYBERSECURITY Question #337: Real Exam Question with Answer & Explanation

The correct answer is D: An external hacker breaching the company's firewall. Insider threats are defined as malicious activities that originate from within an organization, such as an employee or contractor with authorized access to the organization's systems and data (see ISC2 Study Guide, Module 2, under Types of Threats). Examples of insider threats in

Security Principles

Question

Which of the following is NOT considered an insider threat?

Options

  • AAn employee knowingly stealing sensitive data
  • BA vendor misusing company data
  • CAn employee accidentally downloading malware
  • DAn external hacker breaching the company's firewall

Explanation

Insider threats are defined as malicious activities that originate from within an organization, such as an employee or contractor with authorized access to the organization's systems and data (see ISC2 Study Guide, Module 2, under Types of Threats). Examples of insider threats include an employee knowingly stealing sensitive data, an employee accidentally downloading malware, or a vendor misusing company data. An external hacker breaching the company's firewall is not considered an insider threat as it originates from outside of the organization.

Topics

#Insider Threats#Threat Actors#Cybersecurity Threats#Threat Identification

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions