nerdexam
IsacaIsaca

CISA · Question #15

CISA Question #15: Real Exam Question with Answer & Explanation

The correct answer is B: Insider attack. Insider attacks pose the greatest risk to an organization's most sensitive data because malicious insiders already possess authorized access and familiarity with internal systems and data. This makes detection and prevention significantly more challenging than external threats.

Submitted by lucia.co· Apr 18, 2026Protection of Information Assets

Question

Which type of attack poses the GREATEST risk to an organization's most sensitive data?

Options

  • ASpear phishing attack
  • BInsider attack
  • CPassword attack
  • DEavesdropping attack

Explanation

Insider attacks pose the greatest risk to an organization's most sensitive data because malicious insiders already possess authorized access and familiarity with internal systems and data. This makes detection and prevention significantly more challenging than external threats.

Common mistakes.

  • A. Spear phishing attacks are a common vector for initial compromise, but they are typically used to gain access for subsequent actions, not the direct method of data compromise by an already trusted entity.
  • C. Password attacks aim to gain unauthorized access, but once successful, the attacker may still face other internal controls and typically lacks the inherent trust and system knowledge of an insider.
  • D. Eavesdropping attacks involve intercepting data in transit, which can compromise data, but they generally do not provide the broad internal system access and understanding that a malicious insider possesses.

Concept tested. Types of cyber threats and their impact

Reference. https://www.cisa.gov/topics/cyber-threats-and-advisories/insider-threats

Topics

#Insider threat#Sensitive data protection#Risk assessment#Cybersecurity threats

Community Discussion

No community discussion yet for this question.

Full CISA PracticeBrowse All CISA Questions