Which attack is carried out by trusted individuals who have physical access to critical assets?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which attack is carried out by trusted individuals who have physical access to critical assets?

Explanation:
Insider attacks arise when someone who already has legitimate, trusted access to an organization’s assets uses that access to harm, steal, or disrupt. Because these individuals can physically reach critical assets and understand internal processes, they can bypass external defenses, tamper with hardware or software, exfiltrate data, or sabotage systems from within. The scenario describes exactly this situation: trusted personnel who have physical access to valuable assets carry out the attack, which is why this option is the best fit. Other choices don’t match as precisely. Attacks tied to distribution channels focus on tampering with the supply chain or delivery of components before they reach the target, not on a trusted insider exploiting internal access. C2 warfare centers on command-and-control infrastructure used to coordinate attacker actions, rather than on a person inside with direct access to assets. Active attacks is a broad term and could describe many methods, but it doesn’t specifically denote an insider with physical access to critical assets.

Insider attacks arise when someone who already has legitimate, trusted access to an organization’s assets uses that access to harm, steal, or disrupt. Because these individuals can physically reach critical assets and understand internal processes, they can bypass external defenses, tamper with hardware or software, exfiltrate data, or sabotage systems from within. The scenario describes exactly this situation: trusted personnel who have physical access to valuable assets carry out the attack, which is why this option is the best fit.

Other choices don’t match as precisely. Attacks tied to distribution channels focus on tampering with the supply chain or delivery of components before they reach the target, not on a trusted insider exploiting internal access. C2 warfare centers on command-and-control infrastructure used to coordinate attacker actions, rather than on a person inside with direct access to assets. Active attacks is a broad term and could describe many methods, but it doesn’t specifically denote an insider with physical access to critical assets.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy