exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 20 discussion

Actual exam question from Cisco's 200-201
Question #: 20
Topic #: 1
[All 200-201 Questions]

DRAG DROP -
Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nataldogomes
Highly Voted 2 years, 8 months ago
network is compromised => Exploit lack of an access list => Vulnerability configuration review => Risk Assessment leakage of condidential information => Threat
upvoted 33 times
...
Leo_Visser
Highly Voted 2 years, 10 months ago
Answer is incorrect, Exploit and Threat should be switched.
upvoted 14 times
Leo_Visser
2 years, 10 months ago
Exploit = network is compromised "[...] exploit means to take advantage of a vulnerability [...] an exploit refers to a tool, typically in the form of source or binary code." So by taking advantage of the vulnerability the network is compromised. Vulnerability - lack of an access list "A vulnerability is any weakness (known or unknown) in a system, process, or other entity that could lead to its security being compromised by a threat." So not having an ACL could be considered an vulnerability which is then compromised by the threat. Risk Assessment - configuration review "risk constitutes a specific vulnerability matched to a specific threat" So risk assessment work to check for vulenrabilities so doing configuration review matches this. Threat - leakage of confidential information "A threat is any action that could disrupt, harm, destroy, or otherwise adversely affect an information system." This will negativly affect the information system, none of the other options does this so this should be the threat.
upvoted 19 times
...
...
WISDOM2080
Most Recent 8 months, 2 weeks ago
Vulnerability ==> Lack of an access list Exploit ==> Network is compromised Threat ==> leakage of confidential information Risk Assessment ==> Configuration review
upvoted 1 times
...
drdecker100
1 year, 2 months ago
Network is compromised: An exploit is a specific type of attack or technique that is used to take advantage of a vulnerability in a system or network. If an attacker successfully exploits a vulnerability, they may be able to compromise a network and gain unauthorized access to its resources. Leakage of confidential information: A threat is any potential danger or risk to the confidentiality, integrity, or availability of a system or network. If confidential information is leaked, it represents a potential threat to the confidentiality of that information, as well as to the reputation and legal liability of the organization that owns it.
upvoted 2 times
...
Eng_ahmedyoussef
1 year, 7 months ago
Vulnerability ==> Lack of an access list Exploit ==> Network is compromised Threat ==> leakage of confidential information Risk Assessment ==> Configuration review
upvoted 2 times
...
anonymous1966
2 years, 8 months ago
For me the answer is correct, based on the definitions: risk assessment The process of identifying risks to organizational operations. Synonymous with risk analysis. vulnerability Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability. Cyber Threat Any circumstance or event with the potential to adversely impact organizational operations.
upvoted 3 times
anonymous1966
2 years, 7 months ago
Network is compromised by a Cyber Threat Lack of an Access List is a Vulnerability of a system Risk assessment does Configuration Review An Exploit causes a Leakage of confidential information Answer: Network is compromised <--> Threat Lack of an Access List <--> Vulnerability Configuration Review <--> Risk assessment Leakage of confidential information <--> Exploit
upvoted 5 times
adodoccletus
1 year, 10 months ago
A Threat is a consequence an organization faces when a vulnerability has been exploited. So the leakage of confidential information is the threat and not the exploit.
upvoted 1 times
...
...
...
BlackDealth
2 years, 10 months ago
E, V , R, T
upvoted 7 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago