Exam 200-201 All QuestionsBrowse all questions from this exam
Question 28

Which metric is used to capture the level of access needed to launch a successful attack?

    Correct Answer: A

    The metric used to capture the level of access needed to launch a successful attack is 'privileges required.' This metric refers to the level of permissions or access that an attacker must possess to exploit a vulnerability. The higher the privileges required, the more difficult the attack becomes, making it a critical factor in assessing the severity of vulnerabilities. Other metrics like user interaction, attack complexity, and attack vector assess different aspects of the attack but do not specifically measure the level of access needed.

Discussion
TorvaldsOption: D

i Think is "D. attack vector". Attack Vector ( AV) represents the level of access an attacker needs to have to exploit a vulnerability. It can assume four values: Network, Adjacent, Local and Physical. Source: Official cert Guide Cisco CyberOps Associate CBROPS 200-201 Chapter7: Introduction to Security Operations Management. Author: Omar Santos

Dunky

There is little difference that I can see in the description of privileges and attack vector https://www.balbix.com/insights/base-cvss-scores/

Leo_Visser

According to cisco: https://tools.cisco.com/security/center/resources/understanding-terminology.html#exploitability The attack vector metric describes the shortest distance from the attacker to the target. So the privileges required are something else. So A is correct.

alocinOption: D

According with OFFICIAL Cert Guide Cisco O.Santos, correct is D. According with tool.cisco.com terminology, correct is A. Good question ... for me, my opinon, the question means not vector but privileges. Free interpretation .

KC21Option: D

Attack Vector (AV): Represents the level of access an attacker needs to have to exploit a vulnerability. It can assume four values: ■ Network (N) ■ Adjacent (A) ■ Local (L) ■ Physical (P)

KC21

Privileges Required (PR): Represents the level of privileges an attacker must have to exploit the vulnerability. The values are as follows: ■ None (N) ■ Low (L) ■ High (H)

Max_DeJaVOption: D

From Official cert Guide Cisco CyberOps Associate CBROPS 200-201: The base group defines exploitability metrics that measure how the vulnerability can be exploited, and impact metrics that measure the impact on confidentiality, integrity, and availability. In addition to these two, a metric called scope change (S) is used to convey the impact on systems that are affected by the vulnerability but do not contain vulnerable code. Exploitability metrics include the following: • Attack Vector (AV): Represents the level of access an attacker needs to have to exploit a vulnerability. It can assume four values: • Network (N) • Adjacent (A) • Local (L) • Physical (P)

036e554Option: A

ANS: A Privilege required is the metric that refers to the level of access an attacker needs to execute an attack User interaction: This metric assess whether an attack requires a human action to be successful Attack complexity: It is a metric used to measure how difficult it is for an attacker to successfully exploit a vulnerability or execute attack Attack Vector: It refers to specific path uses to gain unauthorized access to a system or network

cevahirogluOption: A

Answer is A. Privileges required: This is a metric that captures the level of access that is required for a successful exploit of the vulnerability.

RoBeryOption: A

A is correct From official Cisco course: Privileges required: This is a metric that captures the level of access that is required for a successful exploit of the vulnerability. Attack vector: This is a metric that reflects the proximity of the threat actor to the vulnerable component. The more remote the threat actor is to the component, the higher the severity. Threat actors close to your network or inside your network are easier to detect and mitigate.

WISDOM2080Option: A

A . privileges required

FaioOption: A

The answer is A. privileges required.

FaioOption: A

Correct Answer: A privileges required. The "attack vector" (D) refers to the path or method used by an attacker to exploit a vulnerability. It describes how the attacker gains access to the target system, but it does not specifically capture the level of access needed to launch the attack.

slippery31Option: D

Correct ANS=D

ShammaAOption: A

Attack Vector simply is --> a way for attackers to enter the system (exploiting vulnerabilities) Whilst the question talks about privileges --> answer PRIVILEGE

slippery31Option: D

Correct Answer=D

Stevens0103Option: A

Source: https://contenthub.netacad.com/legacy/CyberOps/1.1/en/index.html#10.2.2.3 Privileges required – This is a metric that captures the level of access that is required for a successful exploit of the vulnerability.

alhamryOption: A

The best answer is A. privileges required. "Privileges required" is a metric used in the Common Vulnerability Scoring System (CVSS) to measure the level of access an attacker needs to successfully exploit a vulnerability. The other metrics mentioned, such as user interaction, attack complexity, and attack vector, are also used in CVSS to score the severity of a vulnerability, but they do not specifically measure the level of access required.

itousattudOption: A

The correct answer is A. privileges required. The metric "privileges required" is used to capture the level of access needed to launch a successful attack. This metric refers to the level of permissions or access that an attacker would need to have in order to exploit a vulnerability and carry out an attack. For example, an attack that requires administrative privileges to execute would have a higher "privileges required" metric than an attack that can be carried out with only user-level permissions. The higher the level of access required, the more difficult the attack is to carry out and the more severe the potential impact. The other options, user interaction, attack complexity, and attack vector, are also important metrics used in assessing the severity of a vulnerability or attack, but they do not specifically capture the level of access required for a successful attack.

drdecker100Option: A

Going with A. Although D also seems right. Reason: The "attack vector" metric refers to the method or path used by an attacker to launch an attack, such as email, web, or network. While the attack vector is an important metric in assessing the severity of a vulnerability or attack, it does not directly capture the level of access or privileges required to launch the attack. In contrast, the "privileges required" metric specifically measures the level of access or privileges that an attacker needs to have in order to exploit a vulnerability or launch an attack. Therefore, "privileges required" is the more appropriate metric for capturing the level of access needed to launch a successful attack.