Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Certified in Cybersecurity Exam - Topic 4 Question 7 Discussion

Actual exam question for ISC2's Certified in Cybersecurity exam
Question #: 7
Topic #: 4
[All Certified in Cybersecurity Questions]

A hacker gains access to an organization system without authorization and steal confidential dat

a. What term best describes this ?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Amber
7 days ago
I’m with intrusion. It highlights the act of breaking in.
upvoted 0 times
...
Jennie
12 days ago
I agree with breach. It implies serious consequences.
upvoted 0 times
...
Janessa
17 days ago
I lean towards intrusion. It feels more specific.
upvoted 0 times
...
Lavonda
22 days ago
Yeah, breach makes sense. It's unauthorized access.
upvoted 0 times
...
Tammi
27 days ago
I think it's definitely a breach.
upvoted 0 times
...
Haley
2 months ago
Not sure if it's an exploit or a breach...
upvoted 0 times
...
Kendra
2 months ago
No doubt, it's a breach.
upvoted 0 times
...
Stevie
2 months ago
Surprised people still confuse these terms!
upvoted 0 times
...
Gracie
2 months ago
I'd go with C) Intrusion. Sounds like a classic case of hacking into a system.
upvoted 0 times
...
Elfrieda
2 months ago
D) Exploit sounds like the hacker used a vulnerability to gain access. That's the right term.
upvoted 0 times
...
Angelo
2 months ago
B) Breach is the best term here. The hacker stole confidential data, which is a data breach.
upvoted 0 times
...
Vannessa
3 months ago
C) Intrusion is the correct answer. The hacker gained unauthorized access to the system.
upvoted 0 times
...
Alpha
3 months ago
I feel like "Breach" is the most appropriate term here, but I also recall discussions about "Event" in a different context.
upvoted 0 times
...
Elina
3 months ago
I remember practicing a question about unauthorized access, and "Intrusion" was mentioned. Could that be the right answer?
upvoted 0 times
...
Izetta
3 months ago
I think the term might be "Breach," but I'm not entirely sure. It feels like it fits the scenario.
upvoted 0 times
...
Ettie
3 months ago
B) Breach seems like the most straightforward answer here. The hacker breached the organization's system and stole data, so that term seems to fit the situation the best.
upvoted 0 times
...
Ezekiel
3 months ago
I feel pretty confident that the answer is C) Intrusion. The question specifically mentions the hacker gaining access without authorization, which is the definition of an intrusion.
upvoted 0 times
...
Glenn
4 months ago
Okay, let's see. The question is asking about the best term to describe the hacker's actions, which involved stealing confidential data. I'm leaning towards D) Exploit, since that seems to capture the idea of taking advantage of the system.
upvoted 0 times
...
Felicia
4 months ago
I think it's more of an intrusion.
upvoted 0 times
...
Tammara
4 months ago
Definitely a breach!
upvoted 0 times
...
Carri
4 months ago
Exploit could work too, but breach is clearer.
upvoted 0 times
...
Dean
4 months ago
I’m leaning towards "Exploit" since the hacker took advantage of a vulnerability, but I could be mixing it up with something else.
upvoted 0 times
...
Margery
5 months ago
Hmm, I'm not totally sure about this one. I'm debating between B) Breach and C) Intrusion. I'll have to think it through carefully.
upvoted 0 times
...
Laila
5 months ago
I think the answer is C) Intrusion. That seems to best describe the situation where the hacker gained unauthorized access to the system.
upvoted 0 times
Cornell
1 day ago
I agree, C) Intrusion fits well.
upvoted 0 times
...
...

Save Cancel