Free 200-201 Exam Braindumps (page: 8)

Page 7 of 66

What is a purpose of a vulnerability management framework?

  1. identifies, removes, and mitigates system vulnerabilities
  2. detects and removes vulnerabilities in source code
  3. conducts vulnerability scans on the network
  4. manages a list of reported vulnerabilities

Answer(s): A



A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property.
What is the threat agent in this situation?

  1. the intellectual property that was stolen
  2. the defense contractor who stored the intellectual property
  3. the method used to conduct the attack
  4. the foreign government that conducted the attack

Answer(s): D



What is the practice of giving an employee access to only the resources needed to accomplish their job?

  1. principle of least privilege
  2. organizational separation
  3. separation of duties
  4. need to know principle

Answer(s): A



Which metric is used to capture the level of access needed to launch a successful attack?

  1. privileges required
  2. user interaction
  3. attack complexity
  4. attack vector

Answer(s): D

Explanation:

Attack Vector ( AV) represents the level of access an attacker needs to have to exploit a vulnerability. It can assume four values: Network, Adjacent, Local and Physical.


Reference:

Official cert Guide Cisco CyberOps Associate CBROPS 200-201 Chapter7: Introduction to Security Operations Management.






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

200-201 Discussions & Posts