Which option is a misuse variety per VERIS enumerations?

Which option is a misuse variety per VERIS enumerations?
A. snooping
B. hacking
C. theft
D. assault

cisco-exams

9 thoughts on “Which option is a misuse variety per VERIS enumerations?

  1. I think this is the explanation why B is the answer.

    From: http://veriscommunity.net/actions.html#section-misuse

    VERIS classification note: There is an action category for Hacking and for Misuse. Both can utilize similar vectors and achieve similar results; in Misuse, the actor was granted access/privileges (and used them inappropriately), whereas with Hacking, access/privileges are obtained illegitimately.

  2. Agree question is baldly designed and can be interpreted in different ways.
    Within the Actions category there are 4 sub categories: Hacking, Social, Malware and Misuse. So you could possibly answer B: Hacking at this level. However, the question does ask specifically about misuse variety and within the actual Misuse category A,B or C could be construed from the misuse categories.
    Becuase none of the 4 answers are actually referenced specifically I would be tempted to go for the the higher level answer B: Hacking category as opposed to the variety categories
    Thoughts anyone????

  3. from: http://veriscommunity.net/enums.html

    ACTION.PHYSICAL.VARIETY
    Assault: Assault (threats or acts of physical violence)
    Sabotage: Sabotage (deliberate damaging or disabling)
    Snooping: Snooping (sneak about to gain info or access)
    Surveillance: Surveillance (monitoring and observation)
    Tampering: Tampering (alter physical form or function)
    Theft: Theft (taking assets without permission)
    Wiretapping: Wiretapping (Physical tap to comms line)
    Unknown: Unknown
    Other: Other

    3 of them are here:
    A. snooping
    C. theft
    D. assault

    ¿¿¿???

  4. from: http://veriscommunity.net/enums.html

    ACTION.MISUSE.VARIETY

    Knowledge abuse: Abuse of private or entrusted knowledge
    Privilege abuse: Abuse of system access privileges
    Embezzlement: Embezzlement, skimming, and related fraud
    Data mishandling: Handling of data in an unapproved manner
    Email misuse: Inappropriate use of email or IM
    Net misuse: Inappropriate use of network or Web access
    Illicit content: Storage or distribution of illicit content
    Unapproved workaround: Unapproved workaround or shortcut
    Unapproved hardware: Use of unapproved hardware or devices
    Unapproved software: Use of unapproved software or services
    Unknown: Unknown
    Other: Other

    ACTION.MISUSE.VECTOR

    Physical access: Physical access within corporate facility
    LAN access: Local network access within corporate facility
    Remote access: Remote access connection to corporate network (i.e. VPN)
    Non-corporate: Non-corporate facilities or networks
    Unknown: Unknown
    Other: Other

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.