CERTIFIED-IN-CYBERSECURITY · Question #474
CERTIFIED-IN-CYBERSECURITY Question #474: Real Exam Question with Answer & Explanation
The correct answer is C: ... an individual or a group posing to exploit a vulnerability to thwart protection efforts. In cybersecurity, a threat actor is typically defined as an individual, group, or other entity that intends to exploit a vulnerability to defeat defenses. An example of a threat actor could be a group of hackers planning to breach an organization's firewall to gain unauthorized a
Question
A threat actor is ...:
Options
- A... a means to gains access to systems
- B... an exploitable weakness or flaw in a system or component
- C... an individual or a group posing to exploit a vulnerability to thwart protection efforts
- D... an event that can negatively impact the organization
Explanation
In cybersecurity, a threat actor is typically defined as an individual, group, or other entity that intends to exploit a vulnerability to defeat defenses. An example of a threat actor could be a group of hackers planning to breach an organization's firewall to gain unauthorized access (see the ISC2 Study Guide, Chapter 1, Module 2). The rest of the answers provided are incorrect because they describe other cybersecurity concepts. The way to gain unauthorized access to systems is typically described as a vulnerability. Indeed, a vulnerability is an identifiable weakness or flaw in a system or component that can be exploited to cause damage or gain unauthorized access. Finally, an event that can have a negative impact on the organization describes the concept of a threat.
Topics
Community Discussion
No community discussion yet for this question.