A company experiences a security breach where the attacker accessed multiple systems after initially discovering an unpatched server during a wide-scale internet sweep. This type of cybercrime is best classified as:
Opportunistic attacks are cybercrimes where attackers exploit vulnerabilities they happen to find rather than specifically targeting an organization. In the scenario described, the attacker discovered the vulnerability during a wide-scale internet sweep rather than specifically targeting the company, which is the hallmark of an opportunistic attack. Advanced Persistent Threats involve targeted, sophisticated attacks against specific organizations with long-term objectives. Social engineering attacks focus on manipulating people rather than technical vulnerabilities. Zero-day exploits involve previously unknown vulnerabilities but don't specify the targeting approach.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are opportunistic attacks?
Open an interactive chat with Bash
How do opportunistic attacks differ from targeted attacks?
Open an interactive chat with Bash
What is a zero-day exploit and how does it relate to opportunistic attacks?
Open an interactive chat with Bash
ISC2 CISSP
Security and Risk Management
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access