New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 2 Question 97 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 97
Topic #: 2
[All 350-201 Questions]

Refer to the exhibit.

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Elvis
2 months ago
Transferring data to an external server? That's a sneaky one. Gotta watch out for that too.
upvoted 0 times
...
Chaya
2 months ago
Hah, I bet the attacker is going to try and modify the access logs to cover their tracks. Classic move!
upvoted 0 times
Alita
2 months ago
C) An attacker can transfer data to an external server.
upvoted 0 times
...
Robt
2 months ago
B) An attacker can read or change data.
upvoted 0 times
...
Bernadine
2 months ago
A) An attacker can initiate a DoS attack.
upvoted 0 times
...
...
Malika
3 months ago
I'm not so sure. What about the possibility of a DoS attack? That could be just as damaging to the system's availability.
upvoted 0 times
Wenona
2 months ago
We should consider both data manipulation and DoS attacks in the threat model.
upvoted 0 times
...
Jerry
2 months ago
True, a DoS attack could definitely impact the system's availability.
upvoted 0 times
...
Gail
2 months ago
But what about the risk of a DoS attack? That could also be a major threat.
upvoted 0 times
...
Alline
2 months ago
I think the threat model includes the possibility of an attacker reading or changing data.
upvoted 0 times
...
...
Eleni
3 months ago
I believe option A) An attacker can initiate a DoS attack is also a valid threat to consider.
upvoted 0 times
...
Isaac
3 months ago
I agree, B is the correct answer. Protecting the integrity and confidentiality of the data is crucial in this scenario.
upvoted 0 times
Leatha
2 months ago
Absolutely, protecting our data should be our main focus.
upvoted 0 times
...
Luther
2 months ago
Agreed, we should implement strong authentication measures to prevent data breaches.
upvoted 0 times
...
Marva
2 months ago
We need to make sure our database is secure from unauthorized access.
upvoted 0 times
...
Joanna
3 months ago
I think B is the correct answer too. Data security is a top priority.
upvoted 0 times
...
...
Sue
3 months ago
The threat model for the SQL database is definitely B) An attacker can read or change data. That's the most concerning vulnerability here.
upvoted 0 times
Lucina
3 months ago
We need to ensure proper security measures are in place to prevent unauthorized access.
upvoted 0 times
...
Evelynn
3 months ago
I agree, data manipulation by an attacker is a serious threat.
upvoted 0 times
...
...
Tashia
3 months ago
I think the threat model for the SQL database is B) An attacker can read or change data.
upvoted 0 times
...
Emmanuel
3 months ago
I agree with Tashia, unauthorized access to data is a major concern in this scenario.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77