For me the keyword here is breach. B isn't enough for me to determine as breached other access and exploitation. D answered to the word 'data breach' therefore private information has already been extracted.
❌ A. Cyber threats posing as authorized entities
This describes phishing or impersonation attacks, not specifically a cloud data breach.
❌ B. Exploitation of cloud application access
While gaining unauthorized access to a cloud application can be a method used in a breach, it does not define the breach itself (which is the actual leakage of private data).
❌ C. Deprivation of computing resources
This refers to a Denial of Service (DoS) attack, which disrupts access to cloud services but does not involve a data breach.
This is a Cisco test. Cisco uses keywords in the question to guide the answer. The question specifically asks about Cloud Data Breeches and B is unique to that.
While exploiting cloud access can be a method used to breach data, it is not the breach itself. A breach specifically refers to the exposure of private data.
no reference, nothing. I would argue that both B and D are correct. And I couldnt find any Cisco resources to specifically describe what a CLOUD data breach is. if anyone can find something, please let us know
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ITVI
4 weeks, 1 day agomadboy2
1 month, 2 weeks agoNullNull88
2 months, 3 weeks agoNian
1 month, 3 weeks agoPierre_Bouvier
3 months agodorf05
4 months agoton99
5 months, 1 week agoklu16
8 months, 1 week ago