COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The IT manager in your organization proposes taking steps to deflect a potential threat actor. The proposal includes the following:Create and follow onboarding and off-boarding procedures.Employ the principal of least privilege.Have appropriate physical security controls in place.Which type of threat actor do these steps guard against?
A
Script kiddie
B
Hacktivist
C
Insider
D
Competitor
Explanation: 

Detailed explanation-1: -A Competitor threat actor carries out attacks on behalf of an organization and targets competing companies. The motive behind such attacks could be financial gains, competitor defamation, or even stealing industry secrets.

Detailed explanation-2: -Making all users limited users except for those who need administrative access is an example of the principle of least privilege.

There is 1 question to complete.