(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which term describes an entity with authorized access that can harm an information system?

  1. External Threat

  2. Insider Threat

  3. Malicious Actor

  4. Compromised User

The correct answer is: Insider Threat

The term describing an entity with authorized access that can harm an information system is "Insider Threat." Insider threats involve individuals who have legitimate access to an organization's resources, such as employees, contractors, or business partners, and may intentionally or unintentionally engage in harmful activities. These threats can pose significant risks because insiders are often familiar with the organization's security protocols, systems, and sensitive data, allowing them to exploit their access to carry out malicious actions, like data theft or system sabotage. Understanding insider threats is crucial in cybersecurity, as organizations must develop strategies to mitigate this risk through access controls, employee training, and monitoring of user activity to ensure that authorized access is not misused. Other terms, while relevant in the context of cybersecurity, do not specifically capture the essence of having authorized access to harm the system. For instance, external threats typically refer to individuals or groups outside the organization attempting to gain unauthorized access, and malicious actors can refer to any individuals with harmful intent, regardless of their access level. A compromised user refers to a legitimate user who has had their credentials hijacked or misused but does not necessarily imply that the user is acting maliciously themselves.