正解:B
A threat actor is a person or entity that is responsible for an incident that impacts or has the potential to impact an organization's security. A threat actor can have various motivations, such as financial gain, espionage, sabotage, or activism. A threat actor can use various methods, such as malware, phishing, denial-of-service, or social engineering, to perform an attack. A threat actor is not the same as a malware author, a bug bounty hunter, or a direct competitor, although they may be related or associated. A malware author is someone who creates malicious software that can be used by threat actors. A bug bounty hunter is someone who finds and reports vulnerabilities in software or systems for a reward. A direct competitor is someone who offers similar products or services as the organization and may seek to gain an advantage over it. References :
= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 87; CNSSI 4009-
2015, page 77
Reference:https://www.paubox.com/blog/what-is-threat-actor/#:~:text=The%20term%20threat%20actor%
20refers,CTA)%20when%20referencing%20cybersecurity%20issues