Boost your skills for the Ethical Hacking Test. Explore diverse questions, insightful tips, and detailed explanations. Prepare effectively for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What cloud threat is demonstrated by Irin, a disgruntled ex-employee who deliberately accesses critical documents in the cloud?

  1. Data Breach

  2. Malicious insiders

  3. Advanced Persistent Threat

  4. Credential Theft

The correct answer is: Malicious insiders

The situation described with Irin, the disgruntled ex-employee accessing critical documents in the cloud, is a clear example of malicious insiders. This type of threat occurs when individuals within an organization, often with legitimate access to the company’s data, exploit their insider knowledge and privileges to harm the organization, either for personal gain or revenge. In this context, Irin's actions embody traits of a malicious insider because he has authorized access to the cloud, which he misuses due to his discontent with the organization. This situation highlights the unique risks posed by insiders, as they often have a deeper understanding of the company’s systems and data, making their actions particularly dangerous. While other threats such as data breaches and credential theft can certainly be serious issues, they don't accurately capture the nature of Irin's behavior, since the threat originates from someone already inside the organization, rather than an external hacker or a straightforward act of stealing credentials. Advanced Persistent Threats are typically characterized by prolonged and targeted cyberattacks that involve multiple phases and sophisticated techniques, which do not align with the scenario of an ex-employee exploiting their former access to documents.