Which set of systems is described as commonly targeted in cyberattacks?

Prepare for the USNA Professional Competency Board Test. Use resources like flashcards and multi-choice questions. Achieve success with detailed explanations and hints for every question. Boost your confidence and excel on your exam!

Multiple Choice

Which set of systems is described as commonly targeted in cyberattacks?

Explanation:
Targeting systems with broad reach, high-value data, and potential for widespread disruption is a common attacker strategy. Social media platforms hold vast amounts of personal data, relationships, and influence, making accounts and data highly desirable. Cloud services centralize critical data, applications, and infrastructure for many organizations, so compromising them yields extensive access and knock-on effects. Web applications are exposed interfaces that, if vulnerabilities exist, can be exploited to steal data, disrupt services, or pivot to other systems. Critical infrastructure covers essential services like power, water, and transportation, where disruption has immediate, tangible consequences and cascading impacts. These areas offer attackers both the potential payoff and the leverage to affect many users or sectors, which is why they’re frequently prioritized. Other categories—while not irrelevant—tend to be more localized or specialized and don’t present the same combination of scale, value, and impact.

Targeting systems with broad reach, high-value data, and potential for widespread disruption is a common attacker strategy. Social media platforms hold vast amounts of personal data, relationships, and influence, making accounts and data highly desirable. Cloud services centralize critical data, applications, and infrastructure for many organizations, so compromising them yields extensive access and knock-on effects. Web applications are exposed interfaces that, if vulnerabilities exist, can be exploited to steal data, disrupt services, or pivot to other systems. Critical infrastructure covers essential services like power, water, and transportation, where disruption has immediate, tangible consequences and cascading impacts. These areas offer attackers both the potential payoff and the leverage to affect many users or sectors, which is why they’re frequently prioritized. Other categories—while not irrelevant—tend to be more localized or specialized and don’t present the same combination of scale, value, and impact.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy