Which option is a misuse variety per VERIS enumerations?

Which option is a misuse variety per VERIS enumerations?
A. snooping
B. hacking
C. theft
D. assault

cisco-exams

10 thoughts on “Which option is a misuse variety per VERIS enumerations?

  1. The answer is A. Snooping. As an administrator for example can use his access wrongly by having unauthorized access to another person’s or company’s data.

  2. PHYSICAL
    Physical actions encompass deliberate threats that involve proximity, possession, or force. Includes theft, tampering, snooping, sabotage, local device access, assault, etc.

  3. The misuse variety describes the varieties of the misuse that were involved with the incident, which may include:
    1. Privilege abuse: Abuse of system access privileges
    2. Data mishandling: Handling of data in an unapproved manner
    3. Email misuse: Inappropriate use of email
    4. Network misuse: Inappropriate use of network or web access
    5. Illicit content: Storage or distribution of illicit content
    6. Unapproved hardware: Use of unapproved hardware or devices
    7. Unapproved software: Use of unapproved software or services

    Best answer here is snooping but I feel like there is something wrong with this question

  4. MISUSE
    Misuse is defined as the use of entrusted organizational resources or privileges for any purpose or manner contrary to that which was intended. Includes administrative abuse, use policy violations, use of non-approved assets, etc. These actions can be malicious or non-malicious in nature. Misuse is exclusive to parties that enjoy a degree of trust from the organization, such as insiders and partners.
    VERIS classification note: There is an action category for Hacking and for Misuse. Both can utilize similar vectors and achieve similar results; in Misuse, the actor was granted access/privileges (and used them inappropriately), whereas with Hacking, access/privileges are obtained illegitimately.
    Correct Answer = B
    Hacking

  5. MISUSE
    Misuse is defined as the use of entrusted organizational resources or privileges for any purpose or manner contrary to that which was intended. Includes administrative abuse, use policy violations, use of non-approved assets, etc. These actions can be malicious or non-malicious in nature. Misuse is exclusive to parties that enjoy a degree of trust from the organization, such as insiders and partners.

    VERIS classification note: There is an action category for Hacking and for Misuse. Both can utilize similar vectors and achieve similar results; in Misuse, the actor was granted access/privileges (and used them inappropriately), whereas with Hacking, access/privileges are obtained illegitimately.

    Hacking would be the closest one so B

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.