exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 225 discussion

Actual exam question from Cisco's 200-201
Question #: 225
Topic #: 1
[All 200-201 Questions]

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an external USB device to bypass security restrictions and steal data. The engineer could not find an external USB device. Which piece of information must an engineer use for attribution in an investigation?

  • A. receptionist and the actions performed
  • B. stolen data and its criticality assessment
  • C. external USB device
  • D. list of security restrictions and privileges boundaries bypassed
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sheyshey
6 days, 22 hours ago
i agree with most, should be A.. attribution=threat actor
upvoted 2 times
...
Faio
2 months ago
I think it's D
upvoted 1 times
...
AhmedAbdalla
2 months ago
receptionist and the actions performed. Knowing the identity of the receptionist and the specific actions they performed, such as connecting an external USB device to bypass security restrictions and steal data, is crucial for attributing the breach to the responsible individual. This information helps identify the threat actor and establish accountability.
upvoted 1 times
...
SecurityGuy
3 months, 3 weeks ago
Selected Answer: A
Attribution - The action of regarding something as being caused by a person or thing; identifies a source or cause of something. - Synonym: Attribute, Characteristic, Feature, Trait, Quality Cyber Attribution - In an investigation, it is the process of identifying the threat actors who are responsible for an attack. - It involves collecting and analyzing various types of data, including network logs, malware samples, social media activity, and other intelligence sources, to identify the individuals, groups, or nations responsible for the attack. - The process of cyber attribution can help identify the motives, methods, and capabilities of the attackers, which can be useful in preventing future attacks and in pursuing legal action against the perpetrators.
upvoted 1 times
...
slippery31
6 months, 1 week ago
Correct ANS=A
upvoted 1 times
...
c946f3e
7 months ago
The question is "Which piece of information must an engineer use for attribution in an investigation?" and not who or what. These should be Indirect or Corroborative Evidence. Note that the receptionist and the USB are not available. I think D is correct
upvoted 3 times
...
alhamry
7 months, 2 weeks ago
A. receptionist and the actions performed. In this scenario, the focus is on the actor who perpetrated the breach, and the engineer has identified the individual responsible for it. The receptionist's actions and motives will be central to the investigation and attribution of the breach, rather than the USB device used to steal the data. While identifying the USB device could potentially provide additional information, it is not as critical as determining who committed the breach and how they did it.
upvoted 1 times
...
drdecker100
9 months, 3 weeks ago
Selected Answer: A
The engineer must focus on identifying the individual responsible for the breach and the actions they performed. In this case, the receptionist connected an external USB device to bypass security restrictions and steal data, which resulted in the breach. Therefore, the key piece of information for attribution in the investigation is the identity of the receptionist and the actions they took. It is important to determine how the receptionist gained access to the confidential documents and if there were any vulnerabilities in the security system that allowed the breach to occur. This information can help prevent similar breaches in the future.
upvoted 2 times
...
evaline12
11 months ago
Selected Answer: A
Sure, D is correct, but the most important attribution is "receptionist and the actions performed"
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago