New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-85 Exam - Topic 13 Question 17 Discussion

Actual exam question for Eccouncil's 312-85 exam
Question #: 17
Topic #: 13
[All 312-85 Questions]

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.

Daniel comes under which of the following types of threat actor.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Kassandra
4 months ago
State-sponsored? Nah, he's just a lone wolf looking to cash in.
upvoted 0 times
...
Trinidad
4 months ago
Surprised this isn't more obvious, he's clearly in it for the money!
upvoted 0 times
...
Shala
4 months ago
No way, he's just a common criminal in the hacking world.
upvoted 0 times
...
Dino
4 months ago
I think he could also be seen as an insider threat if he has access.
upvoted 0 times
...
Amber
5 months ago
Definitely organized hackers, they operate for profit.
upvoted 0 times
...
Amie
5 months ago
Organized hackers sounds right, but I wonder if there’s a chance he could be considered an industrial spy if he’s targeting specific companies for their data.
upvoted 0 times
...
Jovita
5 months ago
I practiced a question like this before, and I think insider threats are more about employees misusing their access, which doesn’t seem to apply here.
upvoted 0 times
...
Karon
5 months ago
I'm not entirely sure, but I remember something about state-sponsored hackers being more about espionage for governments, not just profit.
upvoted 0 times
...
Vicki
5 months ago
I think Daniel fits the profile of organized hackers since he’s doing it for profit and selling data on the black market.
upvoted 0 times
...
Raylene
5 months ago
This is a good one. I'm pretty confident I can figure this out by thinking through the purpose of the VPN tunnels and the monitoring requirements for the VoIP traffic. I'll make sure to read the question and options carefully.
upvoted 0 times
...
Emerson
5 months ago
Hmm, I'm a bit unsure about this one. I know the report should include key details, but I'm not sure which of these would be unnecessary. I'll have to think it through carefully.
upvoted 0 times
...
Emilio
5 months ago
This question seems straightforward, I think I can handle it.
upvoted 0 times
...
Ruthann
5 months ago
Using BigQuery UPDATE to reduce the dataset size? I'm not sure that's the best approach here. Seems like it could cause more issues than it solves. I'd focus on the denormalization and append strategies.
upvoted 0 times
...

Save Cancel