exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 31 discussion

Actual exam question from Cisco's 350-201
Question #: 31
Topic #: 1
[All 350-201 Questions]

DRAG DROP -
Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DrVoIP
12 months ago
Spoofing attack - Changing configuration settings Broken authentication attack - Developing new code Injection attack - Implementing a new application Man in the middle attack - Installing network devices Privilege escalation attack - Developing new code Default credential attack - Changing configuration settings Note: The matching is based on the understanding that the threats listed are related to potential causes of the attacks rather than the targets of the attacks themselves. - ChatGPT
upvoted 2 times
...
kyle942
1 year, 4 months ago
Default Credentials Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed. [1] Default credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled.
upvoted 1 times
...
TOLU1985
1 year, 4 months ago
Man-in-the-middle – Installing network device Injection attack – developing new code Default credential attack - Implementing a new application Privilege escalation attack - changing configuration settings. rely on below. https://attack.mitre.org/techniques/T0812/ - Defaul credential attack - Changing configuration settings , where Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device https://attack.mitre.org/tactics/TA0111/ - Privilege escalation attack
upvoted 1 times
...
kyle942
1 year, 5 months ago
https://attack.mitre.org/tactics/TA0111/
upvoted 1 times
...
Bobster02
2 years, 2 months ago
3. Default credential attack - Implementing new application 4. Privilege escalation attack - Changing configuration settings
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...