A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an internal threat?

  • the path by which a threat actor can gain access to a server, host, or network
  • intercepted emails that reveal confidential corporate or personal information
  • the potential of causing great damage because of direct access to the building and its infrastructure devices
  • gaining valuable information through the retrieval of discarded unshredded reports