CERTIFIED-IN-CYBERSECURITY · Question #337
CERTIFIED-IN-CYBERSECURITY Question #337: Real Exam Question with Answer & Explanation
The correct answer is D: An external hacker breaching the company's firewall. Insider threats are defined as malicious activities that originate from within an organization, such as an employee or contractor with authorized access to the organization's systems and data (see ISC2 Study Guide, Module 2, under Types of Threats). Examples of insider threats in
Question
Which of the following is NOT considered an insider threat?
Options
- AAn employee knowingly stealing sensitive data
- BA vendor misusing company data
- CAn employee accidentally downloading malware
- DAn external hacker breaching the company's firewall
Explanation
Insider threats are defined as malicious activities that originate from within an organization, such as an employee or contractor with authorized access to the organization's systems and data (see ISC2 Study Guide, Module 2, under Types of Threats). Examples of insider threats include an employee knowingly stealing sensitive data, an employee accidentally downloading malware, or a vendor misusing company data. An external hacker breaching the company's firewall is not considered an insider threat as it originates from outside of the organization.
Topics
Community Discussion
No community discussion yet for this question.