<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What type of cyber attack often targets the availability of data? in CC Study Group</title>
    <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76208#M3071</link>
    <description>&lt;P&gt;Thank you for your explanation!&lt;/P&gt;</description>
    <pubDate>Sun, 12 Jan 2025 11:39:52 GMT</pubDate>
    <dc:creator>CyberGuardian99</dc:creator>
    <dc:date>2025-01-12T11:39:52Z</dc:date>
    <item>
      <title>What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76175#M3066</link>
      <description>&lt;P&gt;- Phishing attacks&lt;/P&gt;&lt;P&gt;- Ransomware attacks&lt;/P&gt;&lt;P&gt;- Man-in-the-middle attacks&lt;/P&gt;&lt;P&gt;- DDoS attacks?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought the answer to this would be &lt;STRONG&gt;Ransomware&lt;/STRONG&gt; attacks and&lt;STRONG&gt; DDoS attacks&lt;/STRONG&gt; but this was wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/9328i5078BAAA642ECB12/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.jpeg" alt="Untitled.jpeg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;What would be correct answer and why would Ransomware not be considered a right answer?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 18:04:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76175#M3066</guid>
      <dc:creator>CyberGuardian99</dc:creator>
      <dc:date>2025-01-10T18:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76184#M3068</link>
      <description>&lt;P&gt;What is the source of the question?&amp;nbsp; Is this from ISC2 or somewhere else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the author is splitting hairs (old saying) here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both Ransomware and DDoS affect the availability.&amp;nbsp; One by encrypting it and the other by crippling the server.&amp;nbsp; With Ransomware the data is available just not usable.&amp;nbsp; DDoS cripples the server and you cannot access the data.&amp;nbsp; Both effectively make the data unavailable to the user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a question from ISC2 then I suggest you send an errata to them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 22:14:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76184#M3068</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2025-01-10T22:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76203#M3069</link>
      <description>&lt;P&gt;The correct answer is DDoS attack. Ransomware compromises the integrity of the Data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;Skylark&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 04:28:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76203#M3069</guid>
      <dc:creator>Skylark1507</dc:creator>
      <dc:date>2025-01-12T04:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76208#M3071</link>
      <description>&lt;P&gt;Thank you for your explanation!&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 11:39:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76208#M3071</guid>
      <dc:creator>CyberGuardian99</dc:creator>
      <dc:date>2025-01-12T11:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76209#M3072</link>
      <description>Agree but ransomware could effect availability but might not as well. DDoS is definitely the best answer. Very true on integrity of the data but doesn’t get mentioned enough.</description>
      <pubDate>Sun, 12 Jan 2025 12:30:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76209#M3072</guid>
      <dc:creator>nkeaton</dc:creator>
      <dc:date>2025-01-12T12:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76248#M3074</link>
      <description>&lt;P&gt;DDoS attack is the correct answer.&lt;/P&gt;&lt;P&gt;You only need to pick 1 response.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2025 13:35:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76248#M3074</guid>
      <dc:creator>sezydenoma</dc:creator>
      <dc:date>2025-01-13T13:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76275#M3076</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/960360733"&gt;@sezydenoma&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;DDoS attack is the correct answer.&lt;/P&gt;&lt;P&gt;You only need to pick 1 response.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There may be many "correct" answers, but there is only one "best" answer. You need to pick the one that is best.&amp;nbsp; Or in some cases, one needs to pick the one that is "least wrong".&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2025 19:39:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/76275#M3076</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-01-13T19:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84176#M4656</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ceres_0-1758692751756.png" style="width: 400px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/10219iCC77632386765465/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ceres_0-1758692751756.png" alt="Ceres_0-1758692751756.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 05:47:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84176#M4656</guid>
      <dc:creator>Ceres</dc:creator>
      <dc:date>2025-09-24T05:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84185#M4658</link>
      <description>&lt;P&gt;We still do not know where the question came from,&amp;nbsp; With two potentially correct answers, it is a trick question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 16:18:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84185#M4658</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2025-09-24T16:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84276#M4668</link>
      <description>&lt;P&gt;DDoS attack hinders the availability of data&lt;/P&gt;</description>
      <pubDate>Sun, 28 Sep 2025 15:11:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84276#M4668</guid>
      <dc:creator>school4real</dc:creator>
      <dc:date>2025-09-28T15:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84317#M4682</link>
      <description>&lt;P&gt;This is from Chat GPT. Its initial response was DDOS is the correct answer. I mentioned that the correct answer (as per above from &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/673300633"&gt;@Ceres&lt;/a&gt;&amp;nbsp;) is actually&amp;nbsp;&lt;STRONG&gt;Ransomware attacks. &lt;/STRONG&gt;It then advised the correct answer is &lt;STRONG&gt;Ransomware attacks&lt;/STRONG&gt; and gives below reasoning.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;BR /&gt;I guess as ChatGPT advises, the reason that the correct answer is&amp;nbsp;&lt;STRONG&gt;Ransomware attacks&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is because this&amp;nbsp;&lt;/SPAN&gt;targets the &lt;STRONG&gt;availability of data &lt;/STRONG&gt;by encrypting files and making them inaccessible until a ransom is paid. While&amp;nbsp;&lt;STRONG&gt;DDoS attacks&lt;/STRONG&gt;&amp;nbsp;target the &lt;STRONG&gt;availability of systems or services&lt;/STRONG&gt; (making a website/server unavailable), but not the &lt;STRONG&gt;&lt;EM&gt;data&lt;/EM&gt; &lt;/STRONG&gt;itself.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;So it depends on wording:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Availability of data → Ransomware&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Availability of systems/services → DDoS&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Since the question specifically says &lt;STRONG&gt;availability of data&lt;/STRONG&gt;, the correct answer is &lt;STRONG&gt;Ransomware attacks &lt;/STRONG&gt;as per my understanding. Interested to see anyone else's thoughts on this?&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CyberGuardian99_0-1759217035825.png" style="width: 400px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/10230i4D44BC2A0E236088/image-size/medium?v=v2&amp;amp;px=400" role="button" title="CyberGuardian99_0-1759217035825.png" alt="CyberGuardian99_0-1759217035825.png" /&gt;&lt;/span&gt;&lt;BR /&gt;Edit: came back to add to this after a while as I saw an email from someone responding in this thread&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 07:35:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84317#M4682</guid>
      <dc:creator>CyberGuardian99</dc:creator>
      <dc:date>2025-09-30T07:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: What type of cyber attack often targets the availability of data?</title>
      <link>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84378#M4702</link>
      <description>&lt;P&gt;phishing&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 07:01:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CC-Study-Group/What-type-of-cyber-attack-often-targets-the-availability-of-data/m-p/84378#M4702</guid>
      <dc:creator>miqayelyan_1981</dc:creator>
      <dc:date>2025-10-03T07:01:26Z</dc:date>
    </item>
  </channel>
</rss>

