New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Certified in Cybersecurity Exam - Topic 4 Question 7 Discussion

Actual exam question for ISC2's Certified in Cybersecurity exam
Question #: 7
Topic #: 4
[All Certified in Cybersecurity Questions]

A hacker gains access to an organization system without authorization and steal confidential dat

a. What term best describes this ?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Haley
12 hours ago
Not sure if it's an exploit or a breach...
upvoted 0 times
...
Kendra
6 days ago
No doubt, it's a breach.
upvoted 0 times
...
Stevie
11 days ago
Surprised people still confuse these terms!
upvoted 0 times
...
Gracie
16 days ago
I'd go with C) Intrusion. Sounds like a classic case of hacking into a system.
upvoted 0 times
...
Elfrieda
21 days ago
D) Exploit sounds like the hacker used a vulnerability to gain access. That's the right term.
upvoted 0 times
...
Angelo
26 days ago
B) Breach is the best term here. The hacker stole confidential data, which is a data breach.
upvoted 0 times
...
Vannessa
1 month ago
C) Intrusion is the correct answer. The hacker gained unauthorized access to the system.
upvoted 0 times
...
Alpha
1 month ago
I feel like "Breach" is the most appropriate term here, but I also recall discussions about "Event" in a different context.
upvoted 0 times
...
Elina
1 month ago
I remember practicing a question about unauthorized access, and "Intrusion" was mentioned. Could that be the right answer?
upvoted 0 times
...
Izetta
2 months ago
I think the term might be "Breach," but I'm not entirely sure. It feels like it fits the scenario.
upvoted 0 times
...
Ettie
2 months ago
B) Breach seems like the most straightforward answer here. The hacker breached the organization's system and stole data, so that term seems to fit the situation the best.
upvoted 0 times
...
Ezekiel
2 months ago
I feel pretty confident that the answer is C) Intrusion. The question specifically mentions the hacker gaining access without authorization, which is the definition of an intrusion.
upvoted 0 times
...
Glenn
2 months ago
Okay, let's see. The question is asking about the best term to describe the hacker's actions, which involved stealing confidential data. I'm leaning towards D) Exploit, since that seems to capture the idea of taking advantage of the system.
upvoted 0 times
...
Felicia
2 months ago
I think it's more of an intrusion.
upvoted 0 times
...
Tammara
2 months ago
Definitely a breach!
upvoted 0 times
...
Carri
3 months ago
Exploit could work too, but breach is clearer.
upvoted 0 times
...
Dean
3 months ago
I’m leaning towards "Exploit" since the hacker took advantage of a vulnerability, but I could be mixing it up with something else.
upvoted 0 times
...
Margery
3 months ago
Hmm, I'm not totally sure about this one. I'm debating between B) Breach and C) Intrusion. I'll have to think it through carefully.
upvoted 0 times
...
Laila
3 months ago
I think the answer is C) Intrusion. That seems to best describe the situation where the hacker gained unauthorized access to the system.
upvoted 0 times
...

Save Cancel