ISC CC Question Answer
An unknown person obtains unauthorized access to the company file system. This is an example of:
Intrusion
Breach
Exploit
Incident
Unauthorized access that compromises confidentiality constitutes abreach. Intrusions become breaches when access is successful.
TESTED 04 Mar 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved