ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 83 - SY0-701 discussion

Report
Export

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.

Which of the following best describes the user's activity?

A.
Penetration testing
Answers
A.
Penetration testing
B.
Phishing campaign
Answers
B.
Phishing campaign
C.
External audit
Answers
C.
External audit
D.
Insider threat
Answers
D.
Insider threat
Suggested answer: D

Explanation:

An insider threat is a security risk that originates from within the organization, such as an employee, contractor, or business partner, who has authorized access to the organization's data and systems. An insider threat can be malicious, such as stealing, leaking, or sabotaging sensitive data, or unintentional, such as falling victim to phishing or social engineering. An insider threat can cause significant damage to the organization's reputation, finances, operations, and legal compliance. The user's activity of logging in remotely after hours and copying large amounts of data to a personal device is an example of a malicious insider threat, as it violates the organization's security policies and compromises the confidentiality and integrity of the data.Reference=Insider Threats -- CompTIA Security+ SY0-701: 3.2, video at 0:00;CompTIA Security+ SY0-701 Certification Study Guide, page 133.

asked 02/10/2024
Jordan Arribas Aranda
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first