An event or attempt to gain unauthorized access or use of an asset is called what?

Master the ISACA IT Risk Fundamentals Exam. Use flashcards and multiple-choice questions with hints and explanations. Prepare effectively for your certification!

Multiple Choice

An event or attempt to gain unauthorized access or use of an asset is called what?

Explanation:
In information security, an attack is a deliberate attempt to access or use an asset without authorization. It refers to the action or event where someone tries to break through defenses or exploit vulnerabilities to compromising confidentiality, integrity, or availability. This distinguishes it from an audit (a review activity), a control (a safeguard put in place to prevent or detect such actions), and a consequence (the impact if a threat is realized). Examples include phishing emails designed to steal credentials, brute-force login attempts, or delivering malware.

In information security, an attack is a deliberate attempt to access or use an asset without authorization. It refers to the action or event where someone tries to break through defenses or exploit vulnerabilities to compromising confidentiality, integrity, or availability. This distinguishes it from an audit (a review activity), a control (a safeguard put in place to prevent or detect such actions), and a consequence (the impact if a threat is realized). Examples include phishing emails designed to steal credentials, brute-force login attempts, or delivering malware.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy