Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco 350-201 Exam - Topic 2 Question 97 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 97
Topic #: 2
[All 350-201 Questions]

Refer to the exhibit.

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Lashunda
5 months ago
Transferring data to an external server is also a possibility!
upvoted 0 times
...
Tiera
6 months ago
DoS attacks are a real concern too, though.
upvoted 0 times
...
Lynelle
6 months ago
Wait, can they really modify access logs? Sounds sketchy.
upvoted 0 times
...
Kenneth
6 months ago
Totally agree, that's a major risk!
upvoted 0 times
...
Pearly
6 months ago
An attacker can read or change data.
upvoted 0 times
...
Verlene
6 months ago
Modifying access logs sounds risky, but I can't recall if that's a common threat model. Maybe option D is less likely?
upvoted 0 times
...
Ronald
7 months ago
I practiced a similar question where data exfiltration was a concern, so option C could also be a possibility.
upvoted 0 times
...
Val
7 months ago
I'm not entirely sure, but I think a DoS attack could impact availability, so option A might be relevant too.
upvoted 0 times
...
Lore
7 months ago
I remember we discussed how SQL databases can be vulnerable to data manipulation, so option B seems likely.
upvoted 0 times
...
Thaddeus
7 months ago
I'm feeling pretty confident about this one. Based on the information provided, I believe the correct answer is option B - an attacker can read or change the data.
upvoted 0 times
...
Whitney
7 months ago
I think the best approach here is to consider the different ways an attacker could potentially compromise the database, like unauthorized access, data manipulation, or denial of service attacks.
upvoted 0 times
...
Francis
7 months ago
I'm a bit confused by the wording of the question. Can the attacker do multiple things, or is it just one specific threat we need to identify?
upvoted 0 times
...
Lavelle
7 months ago
Okay, let's see here. The key seems to be identifying the potential threats to the SQL database given the two types of clients accessing the system.
upvoted 0 times
...
Elenor
7 months ago
Hmm, this looks like a tricky one. I'll need to carefully analyze the threat model based on the information provided in the question.
upvoted 0 times
...
Gilberto
7 months ago
I seem to recall discussing something like this during the review, and I feel like the term “bid solicitation” came up more than once.
upvoted 0 times
...
Elvis
2 years ago
Transferring data to an external server? That's a sneaky one. Gotta watch out for that too.
upvoted 0 times
...
Chaya
2 years ago
Hah, I bet the attacker is going to try and modify the access logs to cover their tracks. Classic move!
upvoted 0 times
Alita
2 years ago
C) An attacker can transfer data to an external server.
upvoted 0 times
...
Robt
2 years ago
B) An attacker can read or change data.
upvoted 0 times
...
Bernadine
2 years ago
A) An attacker can initiate a DoS attack.
upvoted 0 times
...
...
Malika
2 years ago
I'm not so sure. What about the possibility of a DoS attack? That could be just as damaging to the system's availability.
upvoted 0 times
Wenona
2 years ago
We should consider both data manipulation and DoS attacks in the threat model.
upvoted 0 times
...
Jerry
2 years ago
True, a DoS attack could definitely impact the system's availability.
upvoted 0 times
...
Gail
2 years ago
But what about the risk of a DoS attack? That could also be a major threat.
upvoted 0 times
...
Alline
2 years ago
I think the threat model includes the possibility of an attacker reading or changing data.
upvoted 0 times
...
...
Eleni
2 years ago
I believe option A) An attacker can initiate a DoS attack is also a valid threat to consider.
upvoted 0 times
...
Isaac
2 years ago
I agree, B is the correct answer. Protecting the integrity and confidentiality of the data is crucial in this scenario.
upvoted 0 times
Leatha
2 years ago
Absolutely, protecting our data should be our main focus.
upvoted 0 times
...
Luther
2 years ago
Agreed, we should implement strong authentication measures to prevent data breaches.
upvoted 0 times
...
Marva
2 years ago
We need to make sure our database is secure from unauthorized access.
upvoted 0 times
...
Joanna
2 years ago
I think B is the correct answer too. Data security is a top priority.
upvoted 0 times
...
...
Sue
2 years ago
The threat model for the SQL database is definitely B) An attacker can read or change data. That's the most concerning vulnerability here.
upvoted 0 times
Lucina
2 years ago
We need to ensure proper security measures are in place to prevent unauthorized access.
upvoted 0 times
...
Evelynn
2 years ago
I agree, data manipulation by an attacker is a serious threat.
upvoted 0 times
...
...
Tashia
2 years ago
I think the threat model for the SQL database is B) An attacker can read or change data.
upvoted 0 times
...
Emmanuel
2 years ago
I agree with Tashia, unauthorized access to data is a major concern in this scenario.
upvoted 0 times
...

Save Cancel