SY0-601 Exam QuestionsBrowse all questions from this exam

SY0-601 Exam - Question 552


A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks. Which of the following would be best for the security manager to use in a threat model?

Show Answer
Correct Answer: A

The best choice for the security manager to consider in a threat model, given the scenario of the CEO planning to publish a controversial opinion article, would be hacktivists. Hacktivists are individuals or groups who launch cyberattacks based on ideological or political motivations, often in response to content they find objectionable or controversial. In this case, the CEO's article might provoke such groups to target the company, making it crucial to include hacktivists in the threat model to assess and mitigate potential risks.

Discussion

10 comments
Sign in to comment
ApplebeesWaiter1122Option: A
Jul 28, 2023

In this scenario, the CISO is warning the security manager about the CEO's controversial opinion article, which may result in new cyberattacks. Hacktivists are individuals or groups of hackers who engage in hacking activities for ideological or political reasons. They may be motivated to launch cyberattacks in response to the CEO's article due to the controversial nature of its content. Including hacktivists in the threat model would help the security manager assess the potential risk posed by this group and develop appropriate mitigation strategies.

LaiC
Mar 29, 2024

Wouldn't white-hat hackers perform the role of hacktivists (and anyone else that would look to exploit vulnerabilities) in the threat model? is that the what they do? Furthermore, a hacktivist would not work with this company to help them protect the company against... themselves?

LaiC
Mar 29, 2024

*is that not

James_TyeOption: B
Oct 12, 2023

I don't think that chatGPT understood your question. Hacktivist will attempt to hack the company which isn't what the security manager would want. White-hat hackers on the other hand would be able to attempt to anticipate and protect the environment.

ComPCertOnOption: B
Nov 10, 2023

I think it’s B! Judging by the situation! He wouldn’t go and hire those who can pose him threat, then he is worse than the other guy. That’s my understanding at least

ComPCertOn
Nov 10, 2023

I meant it's (D) Insider Threat

MortG7
Jan 23, 2024

Who is talking about hiring?..they are asking about threat modeling..."Which of the following would be best for the security manager to use in a threat model?" Answer is A

Nutter_butter_Option: B
Apr 15, 2024

B makes the most sense

AzureG0dOption: A
Oct 19, 2023

If i'm understanding the question correctly this is the correct answer. You wouldn't consider any of the other's in threat modeling in a situation like the example mentioned.

ComPCertOnOption: D
Nov 10, 2023

I meant it's (D) Insider Threat

kewokil120Option: B
Feb 6, 2024

Going with B. Who asks the hacker. I figure most people would get a white hat on board to review the environment.

GabuuOption: B
Mar 23, 2024

Threat model is a process by which potential threats such as vulnerabilities can be identified and countermeasures prioritized. To better prepare for possibly cyber attacks and eliminate them, the security manager will need to utilize White hat to identify all those possible vulnerabilities.

DapsieOption: A
Jun 15, 2024

It is an opinion article which may attract hacktivists.

JasonMunozOption: D
Jul 16, 2024

I am not really understanding why the majority is saying the answer is A (hacktivist), the CEO could potentially cause cyberattacks, the CEO works for the company, how is that not D (Insider threats)?

JasonMunoz
Jul 16, 2024

Insider threats refer to individuals within an organization who have access to sensitive information and may intentionally or unintentionally cause harm. In this case, the CEO’s actions could inadvertently lead to cyberattacks, making insider threat mitigation crucial.