A government worker secretly copies classified files that contain defense tactics information to an external drive. The government worker then gives the external drive to a corrupt organization. Which of the following best describes the motivation of the worker?
Espionage best describes the motivation of the worker.
Espionage involves the secret gathering of confidential or classified information for unauthorized purposes, typically to benefit a foreign entity or organization. In this case, the government worker's action of copying classified defense tactics to an external drive and handing it over to a corrupt organization is a clear act of espionage.
This choice accurately captures the essence of the worker's actions, as they involve the covert transfer of sensitive information to an unauthorized party. The intent of espionage is to acquire strategic advantages, often for political or military purposes, which aligns perfectly with the situation described.
While data exfiltration refers to the unauthorized transfer of data from a computer or network, it lacks the specific connotation of intent associated with espionage. This term describes the act itself but does not encompass the underlying motivation of providing classified information to a corrupt organization.
Although financial gain could be a potential motivation for some individuals in similar scenarios, the question does not provide evidence that the worker's actions were driven by monetary incentives. The motivations for espionage can include ideology, loyalty to a group, or other non-financial factors, making this choice less accurate.
Blackmail involves coercing someone into acting against their interests, typically through threats of revealing damaging information. In this case, there is no indication that the worker was coerced or attempting to extort money or favors from the government or any other party, so this option does not apply.
The act of secretly copying and distributing classified files to a corrupt organization is best characterized as espionage, reflecting the worker's intent to illegally transfer sensitive information for potentially harmful purposes. This fundamental understanding of their motivations is crucial for addressing security concerns and preventing future incidents of unauthorized data sharing.
Related Questions
View allA security manager wants to reduce the number of steps required to ide...
Which of the following best describes the practice of preserving and d...
Which of the following is the most likely benefit of conducting an int...
At the start of a penetration test, the tester checks OSINT resources...
Which of the following security principles most likely requires valida...
Related Quizzes
View allCompTIA A Plus Certification Exam
CompTIA A Plus Exam Questions
CompTIA A Plus 1001 Exams Practice
CompTIA A Plus Practice Exam
CompTIA CySA+ Cybersecurity Analyst Certification all in One Exam Guide
CompTIA Network Plus Certification Exam Quiz
Free CompTIA Security Plus Practice Test
CompTIA Security Plus Simulation Questions
CompTIA Security Plus 501 Practice Questions
CompTIA Security Plus Example Questions
- ✓ 500+ Practice Questions
- ✓ Detailed Explanations
- ✓ Progress Analytics
- ✓ Exam Simulations