Practice Free 100-160 Exam Online Questions
Question #91
What is the general motivation behind an Advanced Persistent Threat (APT)?
- A . Publicity
- B . Random disruption
- C . Financial gain
- D . Revenge
Correct Answer: C
C
Explanation:
The general motivation behind an APT is often financial gain. Threat actors conducting APTs aim to gain unauthorized access to valuable information, such as financial data or intellectual property, with the intention of extracting monetary value from their targets.
C
Explanation:
The general motivation behind an APT is often financial gain. Threat actors conducting APTs aim to gain unauthorized access to valuable information, such as financial data or intellectual property, with the intention of extracting monetary value from their targets.
Question #92
What is an insider threat?
- A . A threat posed by an individual with authorized access to an organization’s systems and data.
- B . A vulnerability in an organization’s network infrastructure.
- C . The accidental disclosure of sensitive information.
- D . A security breach caused by an external attacker.
Correct Answer: A
A
Explanation:
Insider threats refer to risks and vulnerabilities that arise from individuals who have authorized access to an organization’s systems, networks, or data. These individuals may intentionally or unintentionally cause harm, such as stealing confidential information, sabotaging systems, or disclosing sensitive data to unauthorized entities.
A
Explanation:
Insider threats refer to risks and vulnerabilities that arise from individuals who have authorized access to an organization’s systems, networks, or data. These individuals may intentionally or unintentionally cause harm, such as stealing confidential information, sabotaging systems, or disclosing sensitive data to unauthorized entities.
Question #93
Which of the following best describes the term "as they occur" in the context of cybersecurity?
- A . Planning and executing incident response procedures
- B . Developing mitigation strategies for potential security threats
- C . Conducting regular security audits and assessments
- D . Monitoring and analyzing security events in real-time
Correct Answer: D
D
Explanation:
"As they occur" refers to the practice of continuously monitoring and analyzing security events as they happen. This involves setting up systems and tools to detect and alert on potential security incidents in real-time. By identifying and addressing security events promptly, organizations can reduce the impact and minimize potential damage.
D
Explanation:
"As they occur" refers to the practice of continuously monitoring and analyzing security events as they happen. This involves setting up systems and tools to detect and alert on potential security incidents in real-time. By identifying and addressing security events promptly, organizations can reduce the impact and minimize potential damage.