exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 26 discussion

Actual exam question from Cisco's 200-201
Question #: 26
Topic #: 1
[All 200-201 Questions]

A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?

  • A. the intellectual property that was stolen
  • B. the defense contractor who stored the intellectual property
  • C. the method used to conduct the attack
  • D. the foreign government that conducted the attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jlmadvig
Highly Voted 3 years, 8 months ago
I think is C. the method used to conduct the attack The entity that takes advantage of the vulnerability is known as the malicious actor, and the path used by this actor to perform the attack is known as the threat agent or threat vector. Source: Official cert Guide Cisco CyberOps Associate CBROPS 200-201 Chapter1: Cybersecurity Fundamentals Author: Omar Santos
upvoted 21 times
Mevijil
2 years, 11 months ago
This is the correct answer according to the book - page 10. Threat agent refers to the method, threat actor refers to the attacker. Agent and Actor are not synonyms here - the answer is C.
upvoted 4 times
Frog_Man
5 months, 1 week ago
Read the book, page 10 and it is "C".
upvoted 1 times
...
...
beowolf
3 years, 8 months ago
threat agent AKA threat actor . Given answer is correct
upvoted 10 times
ethhacker
1 year, 4 months ago
Not the same. Read the book
upvoted 1 times
...
...
...
Leo_Visser
Highly Voted 3 years, 7 months ago
Threat agent and Threat actor are the same (see https://itlaw.wikia.org/wiki/Threat_agent) And the threat actor is the organization/person performing the attack. (https://orangematter.solarwinds.com/2018/07/18/cybersecurity-fundamentals-threat-and-attack-terminology/) So D is the correct answer
upvoted 12 times
Chris1971
2 years ago
A threat agent is an active entity motivated to attack our mobile devices and activities. We may identify threat agents as specific organizations or individuals, like Anonymous, or we may classify them by goals or methods of operation (MOs). For example, shoplifters are a class of threat agent that attacks retail stores. https://cryptosmith.com/2016/01/31/threat-agents-and-levels-of-motivation/#:~:text=A%20threat%20agent%20is%20an%20active%20entity%20motivated,class%20of%20threat%20agent%20that%20attacks%20retail%20stores.
upvoted 2 times
...
...
ImGonnaPassIt
Most Recent 1 month ago
Selected Answer: C
According to the book: "The entity that takes advantage of the vulnerability is known as the malicious actor, and the path used by this actor to perform the attack is known as the threat agent or threat vector."
upvoted 1 times
...
Coffeezw
2 months, 3 weeks ago
The correct answer is D, the question didn't specify how the attack was accomplished and it asked what is the threat agent " in this situation"?. So D definitely is the correct answer in this context.
upvoted 1 times
...
KYHO
3 months, 2 weeks ago
In this context, the threat agent is the entity responsible for carrying out the attack. A threat agent is the actor or group that intentionally causes harm or poses a risk.
upvoted 1 times
...
Sbonel0
5 months, 2 weeks ago
The correct answer is D.
upvoted 1 times
...
Frog_Man
6 months, 1 week ago
D>. External threat agents are individuals or groups that originate from outside the target organization.
upvoted 1 times
...
c79ecd3
6 months, 3 weeks ago
Selected Answer: D
Threat agents, also known as threat actors, are individuals or entities that intentionally cause harm or pose a risk to the cyber sphere.
upvoted 1 times
...
fisher004
1 year, 1 month ago
It should be C. Method used to conduct the attack. In the certguide, a threat agent is the path used by the threat actor to perform an attack
upvoted 1 times
...
Mulema
1 year, 1 month ago
The answer is D In cybersecurity, a threat agent is any entity that can exploit vulnerabilities or conduct other damaging activities to a system or organization. This can include individuals, groups, organizations, or even nation-states. Threat agents can be motivated by various factors, such as financial gain, political ideology, or personal vendettas. https://bard.google.com/chat/283439dd3b271707
upvoted 1 times
...
jorgeaaq
1 year, 2 months ago
Selected Answer: D
In summary: A threat is a negative event that can lead to an undesired outcome. A threat actor is the entity (individual or group) that performs the attack. A threat agent is the means by which a threat actor carries out an attack.
upvoted 1 times
jorgeaaq
1 year, 2 months ago
Sorry, Wrong Answer selected... C is correct
upvoted 1 times
...
...
Faio
1 year, 4 months ago
Selected Answer: D What is a threat agent in cyber security? An individual or group that acts, or has the power to, exploit a vulnerability or conduct other damaging activities. The method used to conduct the attack is also not the threat agent, as it is simply a tool used by the threat agent to achieve their goal.
upvoted 1 times
...
WISDOM2080
1 year, 4 months ago
D. the foreign government that conducted the attack
upvoted 1 times
...
Savann
1 year, 5 months ago
Selected Answer: C
Threat Agent = path/method used
upvoted 1 times
...
Swordfishtaco
1 year, 6 months ago
Selected Answer: D
The threat Agent is the person doing the attack
upvoted 2 times
...
KC21
1 year, 7 months ago
Selected Answer: C
The entity that takes advantage of the vulnerability is known as the malicious actor, and the path used by this actor to perform the attack is known as the threat agent or threat vector.
upvoted 1 times
...
alhamry
1 year, 8 months ago
The answer is D. the foreign government that conducted the attack. A threat agent is any person, group, or entity that poses a potential danger to an asset. In this situation, the foreign government is the threat agent because they conducted the attack and stole intellectual property from a defense contractor in the network engineer's home country. The intellectual property that was stolen and the defense contractor who stored it are not the threat agents; rather, they are the assets that were targeted by the threat agent. The method used to conduct the attack is also not the threat agent; it is a means used by the threat agent to achieve their goal.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago