exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 172 discussion

Actual exam question from Cisco's 200-201
Question #: 172
Topic #: 1
[All 200-201 Questions]

Which two elements are assets in the role of attribution in an investigation? (Choose two.)

  • A. context
  • B. session
  • C. laptop
  • D. firewall logs
  • E. threat actor
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mozaki
Highly Voted 1 year, 4 months ago
Selected Answer: AE
NIST, defines the assets used in the role of attribution in a cybersecurity investigation as elements that can help identify the threat actor and understand the background circumstances of the incident. According to NIST, these assets include: Context: This refers to the background information surrounding the incident, such as the time and date of the attack, the type of target, the method of attack, and any other relevant details that can provide insight into the identity of the attacker. Threat actor: This refers to the individual or group responsible for carrying out the attack. Identifying the threat actor is an essential part of attribution and can help determine the motive behind the attack and the level of sophistication of the attacker.
upvoted 8 times
...
halamah
Highly Voted 2 years, 8 months ago
c and d
upvoted 7 times
...
mgo28404
Most Recent 22 hours, 41 minutes ago
Selected Answer: DE
Correct Answers: D and E D. Firewall Logs Firewall logs contain valuable data about traffic patterns, IP addresses, ports, and protocols used. These logs can help trace malicious activity back to its origin, making them an essential asset in attribution. E. Threat Actor Understanding the threat actor—their tactics, techniques, and procedures (TTPs)—is key to attributing an attack to a specific group or individual. This element connects evidence to known attacker profiles, aiding in attribution
upvoted 1 times
...
f2354fb
3 months, 3 weeks ago
Selected Answer: CD
1.8 Describe the role of attribution (“action of bestowing or assigning”) in an investigation. (Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit). This a nice read on the problem of attribution. a. Assets: In information security, computer security and network security, an asset is any data, device, or other component of the environment that supports information-related activities. b. Threat actor: Responsible for the cyberattack. https://vwannabe.com/2018/01/02/ccna-cyber-ops-secops-1-0/
upvoted 1 times
...
RoBery
6 months ago
A and E
upvoted 2 times
...
sheyshey
7 months, 1 week ago
Selected Answer: CD
keyword.... assets CD
upvoted 2 times
...
ethhacker
10 months, 3 weeks ago
I would answer AE, as the question asks for methods to identify the attacker. You would need the context of the attack, methods used, motivation and so on to get a clue if the attacker is motivated by money, political background or other etc... And Threat actor as this helps narrow down the surface of possible attackers
upvoted 4 times
Max_DeJaV
10 months, 2 weeks ago
I agree with this answer, the word "asset" could lead to a wrong assumptions
upvoted 2 times
...
...
NoorJay
1 year ago
The correct answer is CD. Role of Attribution in an investigation: Assets, Threat Actor, IOC, Indicator of Attack and Chain of Custody.
upvoted 3 times
...
slippery31
1 year, 1 month ago
Correct ANS= C, D
upvoted 2 times
...
itmonkey1
1 year, 2 months ago
This is from Google: Assets used in the role of attribution in a cybersecurity investigation as elements that can help identify the threat actor and understand the background circumstances of the incident. which makes me think that A and E are correct.
upvoted 2 times
...
Eng_ahmedyoussef
1 year, 9 months ago
Selected Answer: CD
C & D are the correct answers. asset ==> is anything that has value to an organization. laptop and firewall logs consider an assets in an organization.
upvoted 5 times
...
studyelprof
1 year, 9 months ago
C and D
upvoted 2 times
studyelprof
1 year, 9 months ago
Sorry for the above, the correct answer is D and E Threat actor and Firewall log
upvoted 1 times
...
...
addpro7
2 years, 2 months ago
Selected Answer: CE
correct answer : C & E
upvoted 5 times
...
Alannn
2 years, 10 months ago
I think C,D should be correct: An asset is any data, device or other component of an organisation’s systems that is valuable – often because it contains sensitive data or can be used to access such information. For example, an employee’s desktop computer, laptop or company phone would be considered an asset, as would applications on those devices. Likewise, critical infrastructure, such as servers and support systems, are assets. An organisation’s most common assets are information assets. These are things such as databases and physical files – i.e. the sensitive data that you store.
upvoted 6 times
...
anonymous1966
2 years, 10 months ago
I believe that only C may be correct. I understand that the question asks for the definition of "Asset" in the context of attribution in an investigation. The following are some factors that are used during attribution in an investigation: Assets, Threat actor, Indicators of Compromise (IoCs), Indicators of Attack (IoAs), Chain of custody Asset: This factor identifies which assets were compromised by a threat actor or hacker. An example of an asset can be an organization's domain controller (DC) that runs Active Directory Domain Services (AD DS). AD is a service that allows an administrator to manage user accounts, user groups, and policies across a Microsoft Windows environment. Keep in mind that an asset is anything that has value to an organization; it can be something physical, digital, or even people. Cisco Certified CyberOps Associate 200-201 Certification Guide By Glen D. Singh
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago