nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #474

CERTIFIED-IN-CYBERSECURITY Question #474: Real Exam Question with Answer & Explanation

The correct answer is C: ... an individual or a group posing to exploit a vulnerability to thwart protection efforts. In cybersecurity, a threat actor is typically defined as an individual, group, or other entity that intends to exploit a vulnerability to defeat defenses. An example of a threat actor could be a group of hackers planning to breach an organization's firewall to gain unauthorized a

Security Principles

Question

A threat actor is ...:

Options

  • A... a means to gains access to systems
  • B... an exploitable weakness or flaw in a system or component
  • C... an individual or a group posing to exploit a vulnerability to thwart protection efforts
  • D... an event that can negatively impact the organization

Explanation

In cybersecurity, a threat actor is typically defined as an individual, group, or other entity that intends to exploit a vulnerability to defeat defenses. An example of a threat actor could be a group of hackers planning to breach an organization's firewall to gain unauthorized access (see the ISC2 Study Guide, Chapter 1, Module 2). The rest of the answers provided are incorrect because they describe other cybersecurity concepts. The way to gain unauthorized access to systems is typically described as a vulnerability. Indeed, a vulnerability is an identifiable weakness or flaw in a system or component that can be exploited to cause damage or gain unauthorized access. Finally, an event that can have a negative impact on the organization describes the concept of a threat.

Topics

#Threat actors#Cyber threats#Security concepts#Cybersecurity fundamentals

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions