exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 26 discussion

Actual exam question from Cisco's 200-201
Question #: 26
Topic #: 1
[All 200-201 Questions]

A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?

  • A. the intellectual property that was stolen
  • B. the defense contractor who stored the intellectual property
  • C. the method used to conduct the attack
  • D. the foreign government that conducted the attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jlmadvig
Highly Voted 4 years ago
I think is C. the method used to conduct the attack The entity that takes advantage of the vulnerability is known as the malicious actor, and the path used by this actor to perform the attack is known as the threat agent or threat vector. Source: Official cert Guide Cisco CyberOps Associate CBROPS 200-201 Chapter1: Cybersecurity Fundamentals Author: Omar Santos
upvoted 21 times
Mevijil
3 years, 2 months ago
This is the correct answer according to the book - page 10. Threat agent refers to the method, threat actor refers to the attacker. Agent and Actor are not synonyms here - the answer is C.
upvoted 4 times
Frog_Man
8 months, 4 weeks ago
Read the book, page 10 and it is "C".
upvoted 1 times
...
...
beowolf
4 years ago
threat agent AKA threat actor . Given answer is correct
upvoted 10 times
ethhacker
1 year, 8 months ago
Not the same. Read the book
upvoted 1 times
...
...
...
Leo_Visser
Highly Voted 3 years, 11 months ago
Threat agent and Threat actor are the same (see https://itlaw.wikia.org/wiki/Threat_agent) And the threat actor is the organization/person performing the attack. (https://orangematter.solarwinds.com/2018/07/18/cybersecurity-fundamentals-threat-and-attack-terminology/) So D is the correct answer
upvoted 12 times
Chris1971
2 years, 4 months ago
A threat agent is an active entity motivated to attack our mobile devices and activities. We may identify threat agents as specific organizations or individuals, like Anonymous, or we may classify them by goals or methods of operation (MOs). For example, shoplifters are a class of threat agent that attacks retail stores. https://cryptosmith.com/2016/01/31/threat-agents-and-levels-of-motivation/#:~:text=A%20threat%20agent%20is%20an%20active%20entity%20motivated,class%20of%20threat%20agent%20that%20attacks%20retail%20stores.
upvoted 2 times
...
...
CyberGrog
Most Recent 1 month, 3 weeks ago
Selected Answer: D
The correct answer is: D. the foreign government that conducted the attack Explanation: A threat agent is an entity responsible for carrying out an attack or exploiting vulnerabilities. In this scenario, the foreign government is the actor responsible for orchestrating the attack and stealing the intellectual property. Here’s why the other options are incorrect: • A. the intellectual property that was stolen: This is the target or asset, not the threat agent. • B. the defense contractor who stored the intellectual property: This is the victim or entity impacted by the attack, not the agent causing it. • C. the method used to conduct the attack: This refers to the attack vector or technique, not the entity executing the attack. The threat agent is always the actor or group initiating the malicious activity—in this case, the foreign government.
upvoted 1 times
...
Willieearl1k
1 month, 3 weeks ago
Selected Answer: D
Threat Actor = Threat Agent. The term is very simular.
upvoted 1 times
...
ImGonnaPassIt
4 months, 3 weeks ago
Selected Answer: C
According to the book: "The entity that takes advantage of the vulnerability is known as the malicious actor, and the path used by this actor to perform the attack is known as the threat agent or threat vector."
upvoted 1 times
...
Coffeezw
6 months, 1 week ago
The correct answer is D, the question didn't specify how the attack was accomplished and it asked what is the threat agent " in this situation"?. So D definitely is the correct answer in this context.
upvoted 1 times
...
KYHO
7 months, 1 week ago
In this context, the threat agent is the entity responsible for carrying out the attack. A threat agent is the actor or group that intentionally causes harm or poses a risk.
upvoted 1 times
...
Sbonel0
9 months ago
The correct answer is D.
upvoted 1 times
...
Frog_Man
9 months, 3 weeks ago
D>. External threat agents are individuals or groups that originate from outside the target organization.
upvoted 1 times
...
c79ecd3
10 months, 1 week ago
Selected Answer: D
Threat agents, also known as threat actors, are individuals or entities that intentionally cause harm or pose a risk to the cyber sphere.
upvoted 1 times
...
fisher004
1 year, 5 months ago
It should be C. Method used to conduct the attack. In the certguide, a threat agent is the path used by the threat actor to perform an attack
upvoted 1 times
...
Mulema
1 year, 5 months ago
The answer is D In cybersecurity, a threat agent is any entity that can exploit vulnerabilities or conduct other damaging activities to a system or organization. This can include individuals, groups, organizations, or even nation-states. Threat agents can be motivated by various factors, such as financial gain, political ideology, or personal vendettas. https://bard.google.com/chat/283439dd3b271707
upvoted 1 times
...
jorgeaaq
1 year, 6 months ago
Selected Answer: D
In summary: A threat is a negative event that can lead to an undesired outcome. A threat actor is the entity (individual or group) that performs the attack. A threat agent is the means by which a threat actor carries out an attack.
upvoted 1 times
jorgeaaq
1 year, 6 months ago
Sorry, Wrong Answer selected... C is correct
upvoted 1 times
...
...
Faio
1 year, 7 months ago
Selected Answer: D What is a threat agent in cyber security? An individual or group that acts, or has the power to, exploit a vulnerability or conduct other damaging activities. The method used to conduct the attack is also not the threat agent, as it is simply a tool used by the threat agent to achieve their goal.
upvoted 1 times
...
WISDOM2080
1 year, 8 months ago
D. the foreign government that conducted the attack
upvoted 1 times
...
Savann
1 year, 9 months ago
Selected Answer: C
Threat Agent = path/method used
upvoted 1 times
...
Swordfishtaco
1 year, 10 months ago
Selected Answer: D
The threat Agent is the person doing the attack
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago