(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What are the methods employed by attackers known as?

  1. Threat Models

  2. Attack Vectors

  3. Threat Vectors

  4. Exploitation Techniques

The correct answer is: Threat Vectors

The methods employed by attackers are best described as attack vectors. These vectors refer to the paths or means that attackers use to gain unauthorized access to systems or networks, delivering malicious payloads, exploiting vulnerabilities, and executing their attacks. Understanding attack vectors is crucial in cybersecurity as it helps organizations recognize potential points of entry that adversaries may exploit. The term "threat models" pertains to a framework for identifying and assessing potential threats to a given system, rather than describing the methods used by attackers. "Threat vectors" is less commonly used and can lead to confusion, as it seems to blend concepts without clearly defining the actual attack method. As for "exploitation techniques," while it accurately conveys the approach used during an attack, it does not encompass the broader range of methods or pathways through which attacks can occur, which is precisely what "attack vectors" signifies. Thus, in the context of identifying how attackers operate, "attack vectors" provides the most comprehensive and widely accepted terminology.