ExamGecko
Question list
Search
Search

Related questions











Question 170 - 200-201 discussion

Report
Export

A security incident occurred with the potential of impacting business services. Who performs the attack?

A.

malware author

Answers
A.

malware author

B.

threat actor

Answers
B.

threat actor

C.

bug bounty hunter

Answers
C.

bug bounty hunter

D.

direct competitor

Answers
D.

direct competitor

Suggested answer: B

Explanation:

A threat actor is a person or entity that is responsible for an incident that impacts or has the potential to impact an organization's security. A threat actor can have various motivations, such as financial gain, espionage, sabotage, or activism. A threat actor can use various methods, such as malware, phishing, denial-of-service, or social engineering, to perform an attack. A threat actor is not the same as a malware author, a bug bounty hunter, or a direct competitor, although they may be related or associated. A malware author is someone who creates malicious software that can be used by threat actors. A bug bounty hunter is someone who finds and reports vulnerabilities in software or systems for a reward. A direct competitor is someone who offers similar products or services as the organization and may seek to gain an advantage over it.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 87;CNSSI 4009-2015, page 77

asked 07/10/2024
Jucelino Pinheiro de Andrade da Silva
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first