Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco 200-201 Exam - Topic 2 Question 68 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 68
Topic #: 2
[All 200-201 Questions]

Which security principle is violated by running all processes as root or administrator?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Walker
5 months ago
I thought it also relates to separation of duties?
upvoted 0 times
...
Hayley
5 months ago
It's all about limiting access, for sure.
upvoted 0 times
...
Dalene
5 months ago
Wait, is that really the only principle affected?
upvoted 0 times
...
Germaine
5 months ago
I agree, running everything as root is a bad idea.
upvoted 0 times
...
Mila
5 months ago
Definitely the principle of least privilege!
upvoted 0 times
...
Roxane
6 months ago
I definitely recall that running processes as root violates least privilege. It’s a fundamental concept we covered!
upvoted 0 times
...
Erinn
6 months ago
I’m a bit confused; could it also be about role-based access control? I feel like both could apply in some way.
upvoted 0 times
...
Ariel
6 months ago
I remember practicing a question about access controls, and it mentioned least privilege too. That seems right.
upvoted 0 times
...
Lucina
6 months ago
I think this is related to the principle of least privilege, but I'm not entirely sure.
upvoted 0 times
...
Cherry
6 months ago
Okay, I've got this. The Versa Controller is responsible for providing connectivity to the rest of the head-end components and for Internet breakout to the SD-WAN branches. Those are the two key roles I'm confident about.
upvoted 0 times
...
Vanesa
6 months ago
Okay, I've got a strategy here. I know that Exchange stores email data in EDB and STM files, so those will definitely be important to review. Temporary files and cookie files could also potentially contain clues, so I'll make sure to check those as well.
upvoted 0 times
...
Sage
6 months ago
This seems like a straightforward question about the federal budget process. I'm pretty confident I know the answer, but I'll double-check my notes just to be sure.
upvoted 0 times
...
Chuck
11 months ago
Hmm, running as root? That's like trying to build a skyscraper with Lego bricks. Might as well just invite the hackers in for tea!
upvoted 0 times
Melissa
10 months ago
A) principle of least privilege
upvoted 0 times
...
Teddy
10 months ago
B) role-based access control
upvoted 0 times
...
Irene
10 months ago
A) principle of least privilege
upvoted 0 times
...
...
Caren
11 months ago
The trusted computing base should be as small as possible, and root access certainly doesn't fit that bill. Option D is not the way to go.
upvoted 0 times
Nilsa
9 months ago
Definitely not D) trusted computing base
upvoted 0 times
...
Gladis
9 months ago
C) separation of duties
upvoted 0 times
...
Louisa
9 months ago
B) role-based access control
upvoted 0 times
...
Matthew
9 months ago
A) principle of least privilege
upvoted 0 times
...
Jesusita
9 months ago
Agreed, running everything as root goes against the idea of a small trusted computing base.
upvoted 0 times
...
Evelynn
9 months ago
D) trusted computing base
upvoted 0 times
...
Claudio
9 months ago
Exactly, separating duties helps prevent one user from having too much power.
upvoted 0 times
...
Leana
9 months ago
C) separation of duties
upvoted 0 times
...
Gregg
9 months ago
That's right, role-based access control is important for limiting access to only what is necessary.
upvoted 0 times
...
Alecia
9 months ago
B) role-based access control
upvoted 0 times
...
Lacey
9 months ago
Definitely! Running all processes as root violates the principle of least privilege.
upvoted 0 times
...
Fredric
10 months ago
A) principle of least privilege
upvoted 0 times
...
...
Willie
11 months ago
Separation of duties is the key here. Mixing admin and user roles opens the door to all kinds of mischief. I'd go with option C.
upvoted 0 times
...
Youlanda
11 months ago
Woah, running everything as root? That's like giving a toddler the keys to the entire house. Talk about security risk!
upvoted 0 times
Gretchen
10 months ago
D) trusted computing base
upvoted 0 times
...
Adell
10 months ago
C) separation of duties
upvoted 0 times
...
Lourdes
10 months ago
B) role-based access control
upvoted 0 times
...
Mitsue
11 months ago
A) principle of least privilege
upvoted 0 times
...
...
Mignon
11 months ago
Running all processes as root or administrator definitely violates the principle of least privilege. We should only grant the minimum access required for a process to function.
upvoted 0 times
...
Lonny
11 months ago
I agree with Theron, limiting access to only what is necessary helps reduce the risk of unauthorized access or misuse.
upvoted 0 times
...
Theron
12 months ago
Running all processes as root or administrator violates the principle of least privilege because it gives too much access to resources.
upvoted 0 times
...
Micheal
12 months ago
A) principle of least privilege
upvoted 0 times
...

Save Cancel