(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following is a recommended action following the discovery of malware sharing in a group?

  1. Join in the discussions

  2. Report it to their supervisor

  3. Cease participation in the group

  4. Ignore the issue

The correct answer is: Cease participation in the group

Ceasing participation in the group is a critical and recommended action after discovering malware sharing. Engaging with a group that is involved in any malicious activity, such as sharing malware, could expose individuals and their organizations to significant cybersecurity risks. By stepping back from the group, a person can protect themselves from potential legal repercussions, avoid becoming an unwitting participant in cybercrimes, and help ensure that they do not inadvertently spread any malware themselves. This decision aligns with standard cybersecurity practices that prioritize the safety and integrity of systems and data. It's crucial to distance oneself from environments that endorse or facilitate harmful activities. Remaining involved could also complicate matters if an investigation arises, as ongoing participation might suggest tacit approval or involvement in the behavior. While reporting the issue to a supervisor can also be an appropriate action, ceasing participation directly prevents personal and organizational risk, making it a more immediate and protective response. Engaging in discussions or ignoring the issue would be counterproductive, as they either perpetuate the problem or signal indifference to significant cybersecurity threats.