exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 9 discussion

Actual exam question from Cisco's 350-201
Question #: 9
Topic #: 1
[All 350-201 Questions]


Refer to the exhibit. How must these advisories be prioritized for handling?

  • A. The highest priority for handling depends on the type of institution deploying the devices
  • B. Vulnerability #2 is the highest priority for every type of institution
  • C. Vulnerability #1 and vulnerability #2 have the same priority
  • D. Vulnerability #1 is the highest priority for every type of institution
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vprollc
Highly Voted 3 years, 4 months ago
I also think this should be B. All that is needed is port 80 access on #2 whereas #1 requires a login by a privileged account to exploit.
upvoted 7 times
...
mvdm86
Most Recent 5 months ago
Selected Answer: B
B! seeing being local and login in cant even be called a vulnerability
upvoted 1 times
...
5c2b0e8
8 months, 1 week ago
These questions are very outdated and do not match current exams
upvoted 2 times
...
DrVoIP
1 year, 9 months ago
Based on the information provided, Vulnerability #1 should be considered the highest priority for handling. Vulnerability #1 is a critical vulnerability that allows an attacker to execute arbitrary code with administrative privileges, which could potentially result in a complete compromise of the affected device. Furthermore, the vulnerability can be triggered by a high-privileges administrative user, making it particularly dangerous. In contrast, Vulnerability #2 is a serious but less critical vulnerability that allows an attacker to bypass authorization checks and access sensitive information on the device. While this vulnerability can have significant impact, it does not provide the same level of direct access and control as Vulnerability #1. Furthermore, while there are no fixes available for Vulnerability #2, customers can mitigate
upvoted 1 times
...
DrVoIP
1 year, 9 months ago
I took the exam and found this dump useless for more than a study guide, the quetions are stale and reflect previous test generation and not the current test.
upvoted 4 times
...
ama6
1 year, 10 months ago
did anyone pass the exam lately
upvoted 2 times
Jeki4an
1 year, 10 months ago
The exam has about 80% of new questions not covered here :(
upvoted 2 times
Vic25H
1 year, 6 months ago
Any other source we can check?
upvoted 2 times
...
...
...
TOLU1985
2 years, 2 months ago
Selected Answer: B
Well we have Vul1 - where fix is available and Vul2 - where fix is not available , so better rely on Vul2 priority first to be sure that web-based management is disabled. So Answer is B.
upvoted 2 times
...
CiscoTester
3 years, 8 months ago
sorry, I meant B.
upvoted 1 times
...
CiscoTester
3 years, 8 months ago
Answer C is more critical as it requires no authentication
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...