A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?
Answer(s): D
What is the practice of giving an employee access to only the resources needed to accomplish their job?
Answer(s): A
Which metric is used to capture the level of access needed to launch a successful attack?
What is the difference between an attack vector and attack surface?
Answer(s): C
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
Post your Comments and Discuss Cisco 200-201 exam prep with other Community members:
New-AzureADMSInvitation
AWS Lambda
Amazon RDS
Amazon Athena
terraform.tfstate
plan
apply
EFS
Amazon S3
Athena
S3
containerd
docker
show lldp neighbors
show lldp neighbors detail
Cluster Autoscaler
PriorityClasses
NodeGroups
--authorization-mode=AlwaysAllow
authorization-mode
kubectl explain
kubectl explain <resource>
kubectl explain pod
kubectl explain deployments.spec.template
kubectl explain pods
apiVersion
kind
metadata
spec
status
kubectl explain deployments.spec.template.spec.containers
kubectl api-resources
kubectl get --help
get
kubectl show
💬 Did you find this helpful?
Thank you for sharing! Your feedback helps the community.